New solutions for cybersecurity / edited by Howard Shrobe, David Shrier, and Alex Pentland
Contributor(s): Shrobe, Howard E [editor] | Shrier, David L [editor] | Pentland, Alex [editor].Series: MIT connections science & engineering.Publisher: Cambridge, Massachusetts : The MIT Press, Description: 491 pages : illustrations ; 21 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9780262535373.Subject(s): Computer networks -- Security measures | Internet -- Security measuresGenre/Form: Print books.
|Current location||Call number||Status||Date due||Barcode||Item holds|
|On Shelf||TK5105.59 .N3464 2017 (Browse shelf)||Available||AU00000000012878|
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
|TK5105.59 .K6787 2017 Cyberspace and cybersecurity /||TK5105.59 .M33 2019 Cyber smart : five habits to protect your family, money, and identity from cyber criminals /||TK5105.59 .M966 2018 Investigating the Cyber Breach : the digital forensics guide for the network engineer /||TK5105.59 .N3464 2017 New solutions for cybersecurity /||TK5105.59 .R36 2018 Linux® hardening in hostile networks : server security from TLS to TOR /||TK5105.59 .R54 2004 Network perimeter security : building defense in-depth /||TK5105.59 .R685 2018 Digital resilience : is your company ready for the next cyber threat? /|
Includes bibliographical references
Ongoing cyberattacks, hacks, data breaches, and privacy concerns demonstrate vividly the inadequacy of existing methods of cybersecurity and the need to develop new and better ones. This book brings together experts from across MIT to explore recent advances in cybersecurity from management, technical, and sociological perspectives. Leading researchers from MIT's Computer Science & Artificial Intelligence Lab, the MIT Media Lab, MIT Sloan School of Management, and MIT Lincoln Lab, along with their counterparts at Draper Lab, the University of Cambridge, and SRI, discuss such varied topics as a systems perspective on managing risk, the development of inherently secure hardware, and the Dark Web. The contributors suggest approaches that range from the market-driven to the theoretical, describe problems that arise in a decentralized, IoT world, and reimagine what optimal systems architecture and effective management might look like.