Dodano produkt do koszyka

NOWOŚĆ Promocja

INNOVATIVE APPROACHES TO SOFTWARE SECURITY

Cena po rabacie to najniższa cena z 30 dni przed obniżką

INNOVATIVE APPROACHES TO SOFTWARE SECURITY

SERHII SEMENOV, CAO WEILIN

Wydawnictwo: WYDAWNICTWO NAUKOWE UKEN

Cena: 49.00 zł 44.10 brutto

Koszty dostawy:
  • Paczkomaty InPost 14.99 zł brutto
  • Poczta Polska - odbiór w punkcie 9.99 zł brutto
  • Poczta Polska - przedpłata 15.99 zł brutto
  • Poczta Polska - pobranie 19.99 zł brutto
  • Kurier FEDEX - przedpłata 16.99 zł brutto
  • Kurier DHL - przedpłata 18.99 zł brutto
  • Kurier DHL - pobranie 21.99 zł brutto
  • Odbiór osobisty - UWAGA - uprzejmie prosimy poczekać na informację z księgarni o możliwości odbioru zamówienia - 0.00 zł brutto

Opis

Opis produktu

ISBN: 978-83-68020-84-7

stron: 88

format: B5

oprawa: miękka

rok wydania: 2024

 

The purpose of the monograph research is to improve the efficiency of the software security process based on the synthesis of a complex of mathematical models and the method of automated penetration testing. 

SPIS TREŚCI

INTRODUCTION
SECTION 1
ANALYSIS AND COMPARATIVE STUDIES OF SOFTWARE PENETRATION TESTING METHODS  
1.1.  Software Vulnerabilities Analysis   
1.2. Comparative analysis of methods for identifying vulnerabilities 
1.3. Analysis and comparative study of the main approaches to the mathematical formalization of the penetration testing process
1.4. Formulation of the research problem
Conclusions on Section 1  
SECTION 2
PENETRATION TESTING PROCESS MATHEMATICAL MODELS COMPLEX  
2.1. Problem statement 
2.2. Penetration testing algorithm
2.3. Testing process mathematical model for penetration into computer systems
2.4. Testing process for penetration into computer systems mathematical model modification 
2.5. Testing process for penetration into computer systems modified mathematical model comparative studies
Conclusions under section 2  
SECT1ON 3
AUTOMATED PENETRATION TESTING METHOD USING
DEEP MACHINĘ LEARNING TECHNOLOGY
3.1. Investigation of the capabilities of the Shadov and Mulval platform  
3.2. Development of a method for forming a matrix using the Mulval tool
3.2.1. A method of forming an attack tree  
3.2.2. Algorithm for transforming an attack tree into a cyber intrusion matrix
3.3. Deep Reinforcement Learning to Determine the Optimal Attack Trajectory
3.4. Experimental studies of automated penetration testing method
Conclusions under section 3 
SECTION 4
STUDY OF THE EFFICIENCY OF THE SOFTWARE SECURITY IMPROVING METHOD AND SUBSTANTIATION OF PRACTICAL RECOMMENDATIONS FOR ITS USE
4.1. Formulation of the problem
4.2. Method for evaluating the effectiveness of the developed method for improving SW security
4.3. Justification of the reliability of the results of mathematical modeling 
4.4.  Substantiation of practical recommendations on the use of the software security improvement method 
Conclusions on section 4
CONCLUSIONS 
REFERENCE LIST

Kod wydawnictwa: 978-83-68020-84-7

Opinie, recenzje, testy:

Ten produkt nie ma jeszcze opinii

Twoja opinia

aby wystawić opinię.

Ocena:
  • Wszystkie pola są wymagane
Zapytaj o produkt

Produkty powiązane

Kontakt

Księgarnia Ekonomiczna Kazimierz Leki Sp. z o.o.

ul. Grójecka 67

02-094 Warszawa

NIP: 7010414095

tel. 22 822 90 41

tel. 22 823 64 67

www.24naukowa.com.pl

naukowa@ksiegarnia-ekonomiczna.com.pl