|Listed in category:
Have one to sell?

Moving Target Defense II: Application of Game Theory and Adversarial Modeling by

Condition:
Brand New
3 available
Price:
US $133.74
ApproximatelyS$ 180.16
Postage:
Free Economy Shipping. See detailsfor shipping
Located in: Fairfield, Ohio, United States
Delivery:
Estimated between Thu, 6 Jun and Mon, 17 Jun to 43230
Estimated delivery dates - opens in a new window or tab include seller's handling time, origin ZIP Code, destination ZIP Code and time of acceptance and will depend on shipping service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Buyer pays for return shipping. See details- for more information about returns
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)

Shop with confidence

eBay Premium Service
Trusted seller, fast shipping, and easy returns. 

Seller information

Registered as a Business Seller
Seller assumes all responsibility for this listing.
eBay item number:364701028203
Last updated on May 19, 2024 20:13:10 SGTView all revisionsView all revisions

Item specifics

Condition
Brand New: A new, unread, unused book in perfect condition with no missing or damaged pages. See all condition definitionsopens in a new window or tab
ISBN-13
9781461454151
Book Title
Moving Target Defense II
ISBN
9781461454151
Publication Name
Moving Target Defense II : Application of Game Theory and Adversarial Modeling
Item Length
9.3in
Publisher
Springer New York
Series
Advances in Information Security Ser.
Publication Year
2012
Type
Textbook
Format
Hardcover
Language
English
Item Height
0.2in
Author
Anup K. Ghosh
Item Width
6.1in
Item Weight
158.7 Oz
Number of Pages
Xii, 204 Pages

About this product

Product Information

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In this second volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

Product Identifiers

Publisher
Springer New York
ISBN-10
1461454158
ISBN-13
9781461454151
eBay Product ID (ePID)
154320961

Product Key Features

Author
Anup K. Ghosh
Publication Name
Moving Target Defense II : Application of Game Theory and Adversarial Modeling
Format
Hardcover
Language
English
Series
Advances in Information Security Ser.
Publication Year
2012
Type
Textbook
Number of Pages
Xii, 204 Pages

Dimensions

Item Length
9.3in
Item Height
0.2in
Item Width
6.1in
Item Weight
158.7 Oz

Additional Product Features

Series Volume Number
100
Number of Volumes
1 Vol.
Lc Classification Number
Qa76.9.A25
Table of Content
Game Theoretic Approaches to Attack Surface Shifting.- Security Games Applied to Real-World.- Adversarial Dynamics: The Conficker Case Study.- From Individual Decisions from Experience to Behavioral Game Theory.- Cyber Maneuver Against External Adversaries and Compromised Nodes.- Applying Self-shielding Dynamics to the Network Architecture.- Moving Target Defenses in the Helix Self-Regenerative Architecture.- Diversifying the Software Stack using Randomized NOP Insertion.- Practical Software Diversification Using In-Place Code Randomization.
Copyright Date
2013
Topic
Game Theory, Security / Cryptography, Networking / General, Security / General, Security / Networking
Lccn
2011-935538
Dewey Decimal
005.8
Intended Audience
Scholarly & Professional
Dewey Edition
23
Illustrated
Yes
Genre
Computers, Mathematics

Item description from the seller

grandeagleretail

grandeagleretail

98.2% positive feedback
2.7M items sold
Usually responds within 24 hours

Detailed Seller Ratings

Average for the last 12 months

Accurate description
4.9
Reasonable shipping cost
5.0
Shipping speed
4.9
Communication
4.9

Seller feedback (1,023,351)

e***h (482)- Feedback left by buyer.
Past month
Verified purchase
Great book. Safe, fast shipping! A+
m***h (45)- Feedback left by buyer.
Past month
Verified purchase
Perfect condition
4***a (56)- Feedback left by buyer.
Past month
Verified purchase
arrived in perfect quality