Inicio > Medicina > Medicina: cuestiones generales > Trusted Recovery and Defensive Information Warfare
Trusted Recovery and Defensive Information Warfare

Trusted Recovery and Defensive Information Warfare

Peng Liu / Sushil Jajodia

133,21 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2001
Materia
Medicina: cuestiones generales
ISBN:
9780792375722
133,21 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system. Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted recovery, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Database trusted recovery faces a set of unique challenges. In particular, trusted database recovery is complicated mainly by (a) the presence of benign transactions that depend, directly or indirectly on malicious transactions; and (b) the requirement by many mission-critical database applications that trusted recovery should be done on-the-fly without blocking the execution of new user transactions. Trusted Recovery And Defensive Information Warfare proposes a new model and a set of innovative algorithms for database trusted recovery. Both read-write dependency based and semantics based trusted recovery algorithms are proposed. Both static and dynamic database trusted recovery algorithms are proposed. These algorithms can typically save a lot of work by innocent users and can satisfy a variety of attack recovery requirements of real world database applications. Trusted Recovery And Defensive Information Warfare is suitable as a secondary text for a graduate level course in computer science, and as a reference for researchers and practitioners in information security.

Artículos relacionados

  • 48 Recettes de Repas pour l'élimination de l'acné
    Joe Correa
    48 Recettes de Repas pour ’élimination de l’acné : La voie rapide et naturelle de correction des problèmes d'acné en 10 jours ou moins! Par Joe Correa CSN   Ces recettes vous aideront à avoir un système immunitaire plus fort grâce à une variété de vitamines et de nutriments. Environ 20 pour cent de toutes les personnes souffrent d'acné pendant 20 et 30 ans, et la cau...
    Disponible

    20,65 €

  • 54 Ricette per diabetici per controllare la tua condizione, naturalmente
    Joe Correa
    54 Ricette Per Diabetici Per Controllare La Tua Condizione, Naturalmente: Scelte Alimentari Sane Per Tutti I DiabeticiDi Joe Correa CSN Il diabete si verifica a causa della incapacità del pancreas di produrre insulina. Il diabete di tipo 1 è classificato come una malattia autoimmune. È una condizione in cui il sistema immunitario dell'organismo 'attacca' i propri tessuti e ...
    Disponible

    22,29 €

  • Ubiquitous Cardiology
    Piotr Augustyniak / Ryszard Tadeusiewicz
    The Internet and other technological developments are now playing increasing roles in consumer health and the delivery of health services. Ubiquitous Cardiology: Emerging Wireless Telemedical Applications provides developmental solutions and explanations for cardiovascular diagnostics. Useful to field researchers, academicians, and healthcare practitioners, this Premier Referen...
    Disponible

    217,00 €

  • Quality Assurance in Healthcare Service Delivery, Nursing and Personalized Medicine
    Quality of life is difficult to define and even more difficult to measure; as such, outcomes from nursing in continuing care are not easily articulated. Quality Assurance in Healthcare Service Delivery, Nursing and Personalized Medicine: Technologies and Processes offers a framework for measuring quality of service in the healthcare industry as it pertains to nursing, with insi...
    Disponible

    321,07 €

  • Exploring the Pressures of Medical Education From a Mental Health and Wellness Perspective
    Christina Ramirez Smith
    Discussions surrounding mental health are becoming more prominent and these conditions are becoming less stigmatized. Studying the effects that mental wellness has on students within the medical field can provide an insider perspective on this critical topic. Exploring the Pressures of Medical Education From a Mental Health and Wellness Perspective is a critical reference sourc...
    Disponible

    295,27 €

  • Electrocardiogram Signal Classification and Machine Learning
    Sara Moein
    Technological tools and computational techniques have enhanced the healthcare industry. These advancements have led to significant progress in the diagnosis of heart disorders. Electrocardiogram Signal Classification and Machine Learning: Emerging Research and Opportunities is a critical scholarly resource that examines the importance of automatic normalization and classificati...
    Disponible

    209,74 €

Otros libros del autor

  • Trusted Recovery and Defensive Information Warfare
    Peng Liu / Sushil Jajodia
    Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system. Trusted Rec...
    Disponible

    134,57 €