|Listed in category:
Have one to sell?

Moving Target Defense II: Application of Game Theory and Adversarial Modeling by

Condition:
New
7 available
Price:
US $133.74
ApproximatelyEUR 123.04
Postage:
Free Economy Shipping. See detailsfor postage
Located in: Fairfield, Ohio, United States
Delivery:
Estimated between Tue, 4 Jun and Fri, 14 Jun to 43230
Estimated delivery dates - opens in a new window or tab include seller's dispatch time, origin postcode, destination postcode and time of acceptance and will depend on delivery service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Buyer pays for return postage. See details- for more information about returns
Payments:
    

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. 

Seller information

Registered as a business seller
Seller assumes all responsibility for this listing.
eBay item number:364701028203
Last updated on 03 Apr, 2024 00:49:54 BSTView all revisionsView all revisions

Item specifics

Condition
New: A new, unread, unused book in perfect condition with no missing or damaged pages. See the ...
ISBN-13
9781461454151
Book Title
Moving Target Defense II
ISBN
9781461454151
Publication Name
Moving Target Defense II : Application of Game Theory and Adversarial Modeling
Item Length
9.3in
Publisher
Springer New York
Series
Advances in Information Security Ser.
Publication Year
2012
Type
Textbook
Format
Hardcover
Language
English
Item Height
0.2in
Author
Anup K. Ghosh
Item Width
6.1in
Item Weight
158.7 Oz
Number of Pages
Xii, 204 Pages

About this product

Product Information

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In this second volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

Product Identifiers

Publisher
Springer New York
ISBN-10
1461454158
ISBN-13
9781461454151
eBay Product ID (ePID)
154320961

Product Key Features

Author
Anup K. Ghosh
Publication Name
Moving Target Defense II : Application of Game Theory and Adversarial Modeling
Format
Hardcover
Language
English
Series
Advances in Information Security Ser.
Publication Year
2012
Type
Textbook
Number of Pages
Xii, 204 Pages

Dimensions

Item Length
9.3in
Item Height
0.2in
Item Width
6.1in
Item Weight
158.7 Oz

Additional Product Features

Series Volume Number
100
Number of Volumes
1 Vol.
Lc Classification Number
Qa76.9.A25
Table of Content
Game Theoretic Approaches to Attack Surface Shifting.- Security Games Applied to Real-World.- Adversarial Dynamics: The Conficker Case Study.- From Individual Decisions from Experience to Behavioral Game Theory.- Cyber Maneuver Against External Adversaries and Compromised Nodes.- Applying Self-shielding Dynamics to the Network Architecture.- Moving Target Defenses in the Helix Self-Regenerative Architecture.- Diversifying the Software Stack using Randomized NOP Insertion.- Practical Software Diversification Using In-Place Code Randomization.
Copyright Date
2013
Topic
Game Theory, Security / Cryptography, Networking / General, Security / General, Security / Networking
Lccn
2011-935538
Dewey Decimal
005.8
Intended Audience
Scholarly & Professional
Dewey Edition
23
Illustrated
Yes
Genre
Computers, Mathematics

Item description from the seller

Business seller information

Premier Books LLC
David Taylor
26C Trolley Sq
19806-3356 Wilmington, DE
United States
Show contact information
:liamEmoc.liaterelgaednarg@yabe
I certify that all my selling activities will comply with all EU laws and regulations.
grandeagleretail

grandeagleretail

98.2% positive Feedback
2.7M items sold
Usually responds within 24 hours

Detailed seller ratings

Average for the last 12 months

Accurate description
4.9
Reasonable postage cost
5.0
Delivery time
4.9
Communication
4.9
Registered as a business seller

Seller Feedback (1,023,097)

n***d (1118)- Feedback left by buyer.
Past month
Verified purchase
Comparatively slow shipping but if you are not in hurry it is fine.
p***d (93)- Feedback left by buyer.
Past month
Verified purchase
Ok
t***6 (9)- Feedback left by buyer.
Past month
Verified purchase
Very good condition arrived on time as well