New solutions for cybersecurity / edited by Howard Shrobe, David Shrier, and Alex Pentland
Contributor(s): Shrobe, Howard E [editor] | Shrier, David L [editor] | Pentland, Alex [editor].
Series: MIT connections science & engineering.Publisher: Cambridge, Massachusetts : The MIT Press, [2017]Description: 491 pages : illustrations ; 21 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9780262535373.Subject(s): Computer networks -- Security measures | Internet -- Security measuresGenre/Form: Print books.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | TK5105.59 .N3464 2017 (Browse shelf) | Available | AU00000000012878 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
TK5105.59 .M4833 2020 Web security for developers : real threats, practical defense / | TK5105.59 .M854 2022 Network security and cryptography second edition / | TK5105.59 .M966 2018 Investigating the Cyber Breach : the digital forensics guide for the network engineer / | TK5105.59 .N3464 2017 New solutions for cybersecurity / | TK5105.59 .R36 2018 Linux® hardening in hostile networks : server security from TLS to TOR / | TK5105.59 .R54 2004 Network perimeter security : building defense in-depth / | TK5105.59 .R6733 2021 Comptia CySA+ cybersecurity analyst certification passport (exam cs0-002) / |
Includes bibliographical references
Ongoing cyberattacks, hacks, data breaches, and privacy concerns demonstrate vividly the inadequacy of existing methods of cybersecurity and the need to develop new and better ones. This book brings together experts from across MIT to explore recent advances in cybersecurity from management, technical, and sociological perspectives. Leading researchers from MIT's Computer Science & Artificial Intelligence Lab, the MIT Media Lab, MIT Sloan School of Management, and MIT Lincoln Lab, along with their counterparts at Draper Lab, the University of Cambridge, and SRI, discuss such varied topics as a systems perspective on managing risk, the development of inherently secure hardware, and the Dark Web. The contributors suggest approaches that range from the market-driven to the theoretical, describe problems that arise in a decentralized, IoT world, and reimagine what optimal systems architecture and effective management might look like.