MARC details
000 -LEADER |
fixed length control field |
02814cam a22003014a 4500 |
001 - CONTROL NUMBER |
control field |
16302617 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20201128021151.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100625s2011 xxka frb f001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2010027364 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780521119320 (hardback) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
DLC |
Modifying agency |
DLC |
-- |
EG-ScBUE |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
22 |
Item number |
ALP |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Alpcan, Tansu, |
Dates associated with a name |
1975- |
9 (RLIN) |
36990 |
245 10 - TITLE STATEMENT |
Title |
Network security : |
Remainder of title |
a decision and game-theoretic approach / |
Statement of responsibility, etc |
Tansu Alpcan, Tamer Basar. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Cambridge, United Kingdom ; |
-- |
New York, United States : |
Name of publisher, distributor, etc |
Cambridge University Press, |
Date of publication, distribution, etc |
2011. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiv, 314 p. : |
Other physical details |
ill. ; |
Dimensions |
25 cm. |
500 ## - GENERAL NOTE |
General note |
Index : p. 312-314. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Bibliography : p. [302]-311. |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Machine generated contents note : Preface ; Notation ; Part I. Introduction : 1. Introduction ; 2. Network security concepts ; Part II. Security Games : 3. Deterministic security games ; 4. Stochastic security games ; 5. Security games with information limitations ; Part III. Decision Making for Network Security : 6. Security risk management ; 7. Resource allocation for security ; 8. Usability, trust, and privacy ; Part IV. Security Attack and Intrusion Detection : 9. Machine learning for intrusion and anomaly detection ; 10. Hypothesis testing for attack detection ; A. Optimization, game theory, and optimal & robust control ; References ; Index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security"- |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Network security is an important, challenging, and multi-dimensional research field.In its study, theory and practice should function together as parts of a feedback loop.Game, optimization, and control theories, among others, provide a mathematical foundation to formalize the multitude of decision-making processes in network security. The analytical approaches and quantitative frameworks presented lead to better allocation of limited resources and result in more informed responses to security problems in complex networked systems and organizations"- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures |
9 (RLIN) |
2634 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Game theory |
9 (RLIN) |
3340 |
653 ## - INDEX TERM--UNCONTROLLED |
Resource For college |
Engineering, Electrical |
Arrived date list |
December2014 |
655 ## - INDEX TERM--GENRE/FORM |
Form subdivision |
Reading book |
-- |
34232 |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Basak, T. K. |
9 (RLIN) |
7821 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Call number prefix |
005.8 ALP |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
-- |
2014-12-18 |