000 | 02756nam a22003375i 4500 | ||
---|---|---|---|
001 | 317410 | ||
003 | MX-SnUAN | ||
005 | 20160429161025.0 | ||
007 | cr nn 008mamaa | ||
008 | 160108s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319044477 _9978-3-319-04447-7 |
||
035 | _avtls000416475 | ||
039 | 9 |
_y201601081120 _zstaff |
|
050 | 4 | _aQA76.9.A25 | |
245 | 1 | 0 |
_aCyberpatterns : _bunifying design patterns with security and attack patterns / _cedited by Clive Blackwell, Hong Zhu. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bSpringer, _c2014. |
|
300 |
_axi, 264 páginas : _b48 ilustraciones |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
500 | _aSpringer eBooks | ||
505 | 0 | _aCyberpatterns: Towards a Pattern Oriented Study of Cyberspace -- Towards a Conceptual Framework for Security Patterns -- Design Patterns: Applications and Open Issues -- Challenges For A Formal Framework for Patterns -- Design Space-Based Pattern Representation -- Extending AOP Principles for the Description of Network Security Patterns -- Management Patterns for Network Resilience: Design and Verification of Policy Configurations -- A Heuristic Approach for Secure Service Composition Adaptation.- A Strategy for Structuring and Formalising Attack Patterns -- Attack Pattern Recognition through Correlating Cyber Situational Awareness in Computer Networks -- Towards a Penetration Testing Framework using Attack Patterns -- On the use of Design Patterns to Capture Memory Corruption Vulnerabilities -- ‘Weird Machine’ Patterns -- Towards a Simulation of Information Security Behaviour in Organisations -- Security Design Patterns in the MASTER Workbench -- Evaluating the Implications of Attack and Security Patterns with Premortems -- An Overview of Artificial Intelligence Based Pattern Matching in a Security and Digital Forensic Context -- Partitional Clustering of Malware using K-Means -- Dynamic Monitoring of Composed Services -- Where has this hard disk been? : Extracting geospatial intelligence from digital storage systems -- Future Directions for Research on Cyberpatterns. | |
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aBlackwell, Clive, _eeditor. _9360950 |
|
700 | 1 |
_aZhu, Hong, _eeditor. _9360951 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783319044460 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-319-04447-7 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c317410 _d317410 |