Network Hardening: An Automated Approach to Improving Network Security
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham ; s.l.
Springer International Publishing
2014
Imprint: Springer |
Schriftenreihe: | SpringerBriefs in Computer Science
|
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FHA01 FHM01 FHN01 FKE01 FRO01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (VIII, 60 p.) Ill. |
ISBN: | 9783319046129 |
DOI: | 10.1007/978-3-319-04612-9 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV041781677 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 140407s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783319046129 |c Online |9 978-3-319-04612-9 | ||
024 | 7 | |a 10.1007/978-3-319-04612-9 |2 doi | |
035 | |a (OCoLC)875575847 | ||
035 | |a (DE-599)BVBBV041781677 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-20 |a DE-92 |a DE-859 |a DE-M347 |a DE-473 |a DE-522 |a DE-861 |a DE-Aug4 |a DE-29 |a DE-634 |a DE-739 |a DE-355 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 270 |0 (DE-625)143638: |2 rvk | ||
100 | 1 | |a Wang, Lingyu |e Verfasser |4 aut | |
245 | 1 | 0 | |a Network Hardening |b An Automated Approach to Improving Network Security |c by Lingyu Wang, Massimiliano Albanese, Sushil Jajodia |
264 | 1 | |a Cham ; s.l. |b Springer International Publishing |c 2014 | |
264 | 1 | |b Imprint: Springer | |
300 | |a 1 Online-Ressource (VIII, 60 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in Computer Science | |
533 | |a Online-Ausgabe |f Springer eBook Collection / Computer Science | ||
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Albanese, Massimiliano |e Sonstige |4 oth | |
700 | 1 | |a Jajodia, Sushil |d 1947- |e Sonstige |0 (DE-588)120551683 |4 oth | |
776 | 0 | 8 | |i Reproduktion von |a Wang, Lingyu |t Network Hardening |d 2014 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-04611-2 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-04612-9 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027227474&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027227474&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027227474 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l BFB01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-04612-9 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152094566907904 |
---|---|
adam_text | NETWORK HARDENING
/ WANG, LINGYU
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
RELATED WORK
ATTACK GRAPH AND NETWORK HARDENING
MINIMUM-COST NETWORK HARDENING
LINEAR-TIME NETWORK HARDENING
CONCLUSION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
NETWORK HARDENING
/ WANG, LINGYU
: 2014
ABSTRACT / INHALTSTEXT
THIS SPRINGER BRIEF EXAMINES THE TOOLS BASED ON ATTACK GRAPHS THAT HELP
REVEAL NETWORK HARDENING THREATS. EXISTING TOOLS DETAIL ALL POSSIBLE
ATTACK PATHS LEADING TO CRITICAL NETWORK RESOURCES. THOUGH NO CURRENT
TOOL PROVIDES A DIRECT SOLUTION TO REMOVE THE THREATS, THEY ARE A MORE
EFFICIENT MEANS OF NETWORK DEFENSE THAN RELYING SOLELY ON THE EXPERIENCE
AND SKILLS OF A HUMAN ANALYST. KEY BACKGROUND INFORMATION ON ATTACK
GRAPHS AND NETWORK HARDENING HELPS READERS UNDERSTAND THE COMPLEXITIES
OF THESE TOOLS AND TECHNIQUES. A COMMON NETWORK HARDENING TECHNIQUE
GENERATES HARDENING SOLUTIONS COMPRISED OF INITIALLY SATISFIED
CONDITIONS, THEREBY MAKING THE SOLUTION MORE ENFORCEABLE. FOLLOWING A
DISCUSSION OF THE COMPLEXITY ISSUES IN THIS TECHNIQUE, THE AUTHORS
PROVIDE AN IMPROVED TECHNIQUE THAT CONSIDERS THE DEPENDENCIES BETWEEN
HARDENING OPTIONS AND EMPLOYS A NEAR-OPTIMAL APPROXIMATION ALGORITHM TO
SCALE LINEARLY WITH THE SIZE OF THE INPUTS. ALSO INCLUDED ARE AUTOMATED
SOLUTIONS FOR HARDENING A NETWORK AGAINST SOPHISTICATED MULTI-STEP
INTRUSIONS. NETWORK HARDENING: AN AUTOMATED APPROACH TO IMPROVING
NETWORK SECURITY IS A VALUABLE RESOURCE FOR RESEARCHERS AND
PROFESSIONALS WORKING IN NETWORK SECURITY. IT IS ALSO A USEFUL TOOL FOR
ADVANCED-LEVEL STUDENTS FOCUSED ON SECURITY IN COMPUTER SCIENCE AND
ELECTRICAL ENGINEERING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Wang, Lingyu |
author_GND | (DE-588)120551683 |
author_facet | Wang, Lingyu |
author_role | aut |
author_sort | Wang, Lingyu |
author_variant | l w lw |
building | Verbundindex |
bvnumber | BV041781677 |
classification_rvk | ST 200 ST 270 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)875575847 (DE-599)BVBBV041781677 |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-04612-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03697nmm a2200661 c 4500</leader><controlfield tag="001">BV041781677</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140407s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319046129</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-04612-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-04612-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)875575847</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041781677</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 270</subfield><subfield code="0">(DE-625)143638:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wang, Lingyu</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network Hardening</subfield><subfield code="b">An Automated Approach to Improving Network Security</subfield><subfield code="c">by Lingyu Wang, Massimiliano Albanese, Sushil Jajodia</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham ; s.l.</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="b">Imprint: Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VIII, 60 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computer Science</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Online-Ausgabe</subfield><subfield code="f">Springer eBook Collection / Computer Science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Albanese, Massimiliano</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="d">1947-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)120551683</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Reproduktion von</subfield><subfield code="a">Wang, Lingyu</subfield><subfield code="t">Network Hardening</subfield><subfield code="d">2014</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-04611-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027227474&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027227474&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027227474</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-04612-9</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041781677 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:05:15Z |
institution | BVB |
isbn | 9783319046129 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027227474 |
oclc_num | 875575847 |
open_access_boolean | |
owner | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-861 DE-Aug4 DE-29 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-861 DE-Aug4 DE-29 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (VIII, 60 p.) Ill. |
psigel | ZDB-2-SCS |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer International Publishing Imprint: Springer |
record_format | marc |
series2 | SpringerBriefs in Computer Science |
spelling | Wang, Lingyu Verfasser aut Network Hardening An Automated Approach to Improving Network Security by Lingyu Wang, Massimiliano Albanese, Sushil Jajodia Cham ; s.l. Springer International Publishing 2014 Imprint: Springer 1 Online-Ressource (VIII, 60 p.) Ill. txt rdacontent c rdamedia cr rdacarrier SpringerBriefs in Computer Science Online-Ausgabe Springer eBook Collection / Computer Science Datenschutz (DE-588)4011134-9 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s Informationssystem (DE-588)4072806-7 s DE-604 Albanese, Massimiliano Sonstige oth Jajodia, Sushil 1947- Sonstige (DE-588)120551683 oth Reproduktion von Wang, Lingyu Network Hardening 2014 Erscheint auch als Druckausgabe 978-3-319-04611-2 https://doi.org/10.1007/978-3-319-04612-9 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027227474&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027227474&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Wang, Lingyu Network Hardening An Automated Approach to Improving Network Security Datenschutz (DE-588)4011134-9 gnd Informatik (DE-588)4026894-9 gnd Informationssystem (DE-588)4072806-7 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4026894-9 (DE-588)4072806-7 |
title | Network Hardening An Automated Approach to Improving Network Security |
title_auth | Network Hardening An Automated Approach to Improving Network Security |
title_exact_search | Network Hardening An Automated Approach to Improving Network Security |
title_full | Network Hardening An Automated Approach to Improving Network Security by Lingyu Wang, Massimiliano Albanese, Sushil Jajodia |
title_fullStr | Network Hardening An Automated Approach to Improving Network Security by Lingyu Wang, Massimiliano Albanese, Sushil Jajodia |
title_full_unstemmed | Network Hardening An Automated Approach to Improving Network Security by Lingyu Wang, Massimiliano Albanese, Sushil Jajodia |
title_short | Network Hardening |
title_sort | network hardening an automated approach to improving network security |
title_sub | An Automated Approach to Improving Network Security |
topic | Datenschutz (DE-588)4011134-9 gnd Informatik (DE-588)4026894-9 gnd Informationssystem (DE-588)4072806-7 gnd |
topic_facet | Datenschutz Informatik Informationssystem |
url | https://doi.org/10.1007/978-3-319-04612-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027227474&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027227474&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT wanglingyu networkhardeninganautomatedapproachtoimprovingnetworksecurity AT albanesemassimiliano networkhardeninganautomatedapproachtoimprovingnetworksecurity AT jajodiasushil networkhardeninganautomatedapproachtoimprovingnetworksecurity |