Cena po rabacie to najniższa cena z 30 dni przed obniżką
INNOVATIVE APPROACHES TO SOFTWARE SECURITY
SERHII SEMENOV, CAO WEILIN
Wydawnictwo: WYDAWNICTWO NAUKOWE UKEN
Cena: 49.00 zł
44.10 zł brutto
- Paczkomaty InPost 14.99 zł brutto
- Poczta Polska - odbiór w punkcie 9.99 zł brutto
- Poczta Polska - przedpłata 15.99 zł brutto
- Poczta Polska - pobranie 19.99 zł brutto
- Kurier FEDEX - przedpłata 16.99 zł brutto
- Kurier DHL - przedpłata 18.99 zł brutto
- Kurier DHL - pobranie 21.99 zł brutto
- Odbiór osobisty - UWAGA - uprzejmie prosimy poczekać na informację z księgarni o możliwości odbioru zamówienia - 0.00 zł brutto
Opis
ISBN: 978-83-68020-84-7
stron: 88
format: B5
oprawa: miękka
rok wydania: 2024
The purpose of the monograph research is to improve the efficiency of the software security process based on the synthesis of a complex of mathematical models and the method of automated penetration testing.
SPIS TREŚCI
INTRODUCTION
SECTION 1
ANALYSIS AND COMPARATIVE STUDIES OF SOFTWARE PENETRATION TESTING METHODS
1.1. Software Vulnerabilities Analysis
1.2. Comparative analysis of methods for identifying vulnerabilities
1.3. Analysis and comparative study of the main approaches to the mathematical formalization of the penetration testing process
1.4. Formulation of the research problem
Conclusions on Section 1
SECTION 2
PENETRATION TESTING PROCESS MATHEMATICAL MODELS COMPLEX
2.1. Problem statement
2.2. Penetration testing algorithm
2.3. Testing process mathematical model for penetration into computer systems
2.4. Testing process for penetration into computer systems mathematical model modification
2.5. Testing process for penetration into computer systems modified mathematical model comparative studies
Conclusions under section 2
SECT1ON 3
AUTOMATED PENETRATION TESTING METHOD USING
DEEP MACHINĘ LEARNING TECHNOLOGY
3.1. Investigation of the capabilities of the Shadov and Mulval platform
3.2. Development of a method for forming a matrix using the Mulval tool
3.2.1. A method of forming an attack tree
3.2.2. Algorithm for transforming an attack tree into a cyber intrusion matrix
3.3. Deep Reinforcement Learning to Determine the Optimal Attack Trajectory
3.4. Experimental studies of automated penetration testing method
Conclusions under section 3
SECTION 4
STUDY OF THE EFFICIENCY OF THE SOFTWARE SECURITY IMPROVING METHOD AND SUBSTANTIATION OF PRACTICAL RECOMMENDATIONS FOR ITS USE
4.1. Formulation of the problem
4.2. Method for evaluating the effectiveness of the developed method for improving SW security
4.3. Justification of the reliability of the results of mathematical modeling
4.4. Substantiation of practical recommendations on the use of the software security improvement method
Conclusions on section 4
CONCLUSIONS
REFERENCE LIST
Kod wydawnictwa: 978-83-68020-84-7
Ten produkt nie ma jeszcze opinii
Twoja opinia
aby wystawić opinię.