Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Managing cyber threats : issues, approaches, and challenges (Massive Computing)
Kumar V. (ed), Srivastava J., Lazarevic A., Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 330 pp. Type: Book (9780387242262)
Date Reviewed: Oct 26 2005

Few information systems-related issues have generated as much interest, agony, and damage to local or federal organizations, businesses, and individuals as cyber threats—that is, security violations, identity thefts, unauthorized intrusions, privacy violations, data integrity violations, denials of service, and infrastructure attacks. This volume, impressive in both its breadth and depth, contains 13 contributions from leading scientists in the field, examining the current situation, presenting approaches to handle the issues, and divulging the main research-related and practical challenges occurring.

The issues discussed in detail include intrusion detection, anomaly detection in network traffic, statistical causality analyses, sensor families for intrusion detection infrastructures, cluster analysis for massive network security data, and alert management. All of the contributions contain nice introductions, links to similar research done by other scientists, and adequate references, many of which are electronic, and thus directly accessible for readers. Several contributions discuss detailed algorithms and models.

Massive cyber forensics—the integration and correlation of law enforcement information with public cyber-based information—and digital forensics on individual computer systems are also discussed in two contributions at the end of the volume. The related legal and social issues are also briefly discussed.

The volume will be very handy for computer security researchers and information technology professionals working at large data centers. It contains how-to information, and discussions of existing tools and test data, and the creation of new tools.

Reviewer:  Constantin S. Chassapis Review #: CR131936 (0609-0924)
Bookmark and Share
 
Invasive Software (K.6.5 ... )
 
 
Invasive Software (D.4.6 ... )
 
 
Unauthorized Access (K.6.5 ... )
 
 
Security and Protection (D.4.6 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Invasive Software": Date
Rogue programs: viruses, worms and Trojan horses
Hoffman L. (ed) Van Nostrand Reinhold Co., New York, NY,1990. Type: Divisible Book
Sep 1 1991
Computer viruses and anti-virus warfare
Hruska J., Ellis Horwood, Upper Saddle River, NJ, 1990. Type: Book (9780131710672)
Sep 1 1991
The computer virus handbook
Levin R., Osborne/McGraw-Hill, Berkeley, CA, 1990. Type: Book (9780078816475)
Sep 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy