New solutions for cybersecurity / edited by Howard Shrobe, David Shrier, and Alex Pentland
Contributor(s): Shrobe, Howard E [editor] | Shrier, David L [editor] | Pentland, Alex [editor].Series: MIT connections science & engineering.Publisher: Cambridge, Massachusetts : The MIT Press, Description: 491 pages : illustrations ; 21 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9780262535373.Subject(s): Computer networks -- Security measures | Internet -- Security measuresGenre/Form: Print books.
|Current location||Call number||Status||Date due||Barcode||Item holds|
|On Shelf||TK5105.59 .N3464 2017 (Browse shelf)||Available||AU00000000012878|
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
|TK5105.59 .F57 2019 CISO compass : navigating cybersecurity leadership challenges with insights from pioneers /||TK5105.59 .K6787 2017 Cyberspace and cybersecurity /||TK5105.59 .M966 2018 Investigating the Cyber Breach : the digital forensics guide for the network engineer /||TK5105.59 .N3464 2017 New solutions for cybersecurity /||TK5105.59 .R36 2018 Linux® hardening in hostile networks : server security from TLS to TOR /||TK5105.59 .R685 2018 Digital resilience : is your company ready for the next cyber threat? /||TK5105.59 .S263 2017 CCNA Cyber Ops SECFND 210-250 official cert guide /|
Includes bibliographical references
Ongoing cyberattacks, hacks, data breaches, and privacy concerns demonstrate vividly the inadequacy of existing methods of cybersecurity and the need to develop new and better ones. This book brings together experts from across MIT to explore recent advances in cybersecurity from management, technical, and sociological perspectives. Leading researchers from MIT's Computer Science & Artificial Intelligence Lab, the MIT Media Lab, MIT Sloan School of Management, and MIT Lincoln Lab, along with their counterparts at Draper Lab, the University of Cambridge, and SRI, discuss such varied topics as a systems perspective on managing risk, the development of inherently secure hardware, and the Dark Web. The contributors suggest approaches that range from the market-driven to the theoretical, describe problems that arise in a decentralized, IoT world, and reimagine what optimal systems architecture and effective management might look like.