Network security : (Record no. 18801)

MARC details
000 -LEADER
fixed length control field 02814cam a22003014a 4500
001 - CONTROL NUMBER
control field 16302617
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20201128021151.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100625s2011 xxka frb f001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010027364
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780521119320 (hardback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
-- EG-ScBUE
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number ALP
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Alpcan, Tansu,
Dates associated with a name 1975-
9 (RLIN) 36990
245 10 - TITLE STATEMENT
Title Network security :
Remainder of title a decision and game-theoretic approach /
Statement of responsibility, etc Tansu Alpcan, Tamer Basar.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Cambridge, United Kingdom ;
-- New York, United States :
Name of publisher, distributor, etc Cambridge University Press,
Date of publication, distribution, etc 2011.
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 314 p. :
Other physical details ill. ;
Dimensions 25 cm.
500 ## - GENERAL NOTE
General note Index : p. 312-314.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Bibliography : p. [302]-311.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note : Preface ; Notation ; Part I. Introduction : 1. Introduction ; 2. Network security concepts ; Part II. Security Games : 3. Deterministic security games ; 4. Stochastic security games ; 5. Security games with information limitations ; Part III. Decision Making for Network Security : 6. Security risk management ; 7. Resource allocation for security ; 8. Usability, trust, and privacy ; Part IV. Security Attack and Intrusion Detection : 9. Machine learning for intrusion and anomaly detection ; 10. Hypothesis testing for attack detection ; A. Optimization, game theory, and optimal & robust control ; References ; Index.
520 ## - SUMMARY, ETC.
Summary, etc "Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security"-
520 ## - SUMMARY, ETC.
Summary, etc "Network security is an important, challenging, and multi-dimensional research field.In its study, theory and practice should function together as parts of a feedback loop.Game, optimization, and control theories, among others, provide a mathematical foundation to formalize the multitude of decision-making processes in network security. The analytical approaches and quantitative frameworks presented lead to better allocation of limited resources and result in more informed responses to security problems in complex networked systems and organizations"-
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
9 (RLIN) 2634
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Game theory
9 (RLIN) 3340
653 ## - INDEX TERM--UNCONTROLLED
Resource For college Engineering, Electrical
Arrived date list December2014
655 ## - INDEX TERM--GENRE/FORM
Form subdivision Reading book
-- 34232
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Basak, T. K.
9 (RLIN) 7821
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Call number prefix 005.8 ALP
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- 2014-12-18
Holdings
Withdrawn status Item status Source of classification or shelving scheme Damaged status Not for loan Vendor Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Serial Enumeration / chronology Total Checkouts Full call number Barcode Date last seen Date last borrowed Cost, replacement price Koha item type
    Dewey Decimal Classification     Baccah Central Library Central Library Lower Floor 18/12/2014 Purchase 828.00 21291 1 005.8 ALP 000037218 11/06/2024 11/11/2015 1035.00 Book - Borrowing