000 -LEADER |
fixed length control field |
a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
200616b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780262535373 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
658.478 |
Item number |
SHR |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Shrobe, Howard |
245 ## - TITLE STATEMENT |
Title |
New solutions for cybersecurity |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
MIT Press |
Date of publication, distribution, etc |
2017 |
Place of publication, distribution, etc |
London |
300 ## - PHYSICAL DESCRIPTION |
Extent |
491 p. |
Other physical details |
ill. |
Dimensions |
21 cm. |
365 ## - TRADE PRICE |
Price amount |
25.00 |
Price type code |
USD |
Unit of pricing |
77.50 |
490 ## - SERIES STATEMENT |
Series statement |
MIT connections science & engineering |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references |
520 ## - SUMMARY, ETC. |
Summary, etc |
Ongoing cyberattacks, hacks, data breaches, and privacy concerns demonstrate vividly the inadequacy of existing methods of cybersecurity and the need to develop new and better ones. This book brings together experts from across MIT to explore recent advances in cybersecurity from management, technical, and sociological perspectives. Leading researchers from MIT's Computer Science & Artificial Intelligence Lab, the MIT Media Lab, MIT Sloan School of Management, and MIT Lincoln Lab, along with their counterparts at Draper Lab, the University of Cambridge, and SRI, discuss such varied topics as a systems perspective on managing risk, the development of inherently secure hardware, and the Dark Web. The contributors suggest approaches that range from the market-driven to the theoretical, describe problems that arise in a decentralized, IoT world, and reimagine what optimal systems architecture and effective management might look like. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
|
Topical term or geographic name as entry element |
Cybersecurity |
|
Topical term or geographic name as entry element |
Data security |
710 ## - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
Shrier, David L. |
|
Corporate name or jurisdiction name as entry element |
Pentland, Alex |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |