Skip to product information
1 of 1
Regular price £89.29 GBP
Regular price £110.00 GBP Sale price £89.29 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 6 days lead

Network Security
A Decision and Game-Theoretic Approach

Applies quantitative models derived from decision, control and game theories to understanding diverse network security problems.

Tansu Alpcan (Author), Tamer Ba?ar (Author)

9780521119320, Cambridge University Press

Hardback, published 21 October 2010

334 pages, 74 b/w illus. 11 tables
24.9 x 17.5 x 2 cm, 0.8 kg

'The great advantage of this book is that the authors [cover] exhaustively theoretical background related to decision and game theories with a lot of motivating examples. The work is written without unnecessary complexity, while the organization is clear and the contents is … readable. I can recommend … to researchers and graduate students as well as to engineers, mainly system administrators and security officers.' IEEE Communications Magazine

Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security.

Preface
Notation
Part I. Introduction: 1. Introduction
2. Network security concepts
Part II. Security Games: 3. Deterministic security games
4. Stochastic security games
5. Security games with information limitations
Part III. Decision Making for Network Security: 6. Security risk management
7. Resource allocation for security
8. Usability, trust, and privacy
Part IV. Security Attack and Intrusion Detection: 9. Machine learning for intrusion and anomaly detection
10. Hypothesis testing for attack detection
A. Optimization, game theory, and optimal & robust control
References
Index.

Subject Areas: Computer networking & communications [UT], Computer security [UR], Communications engineering / telecommunications [TJK], Electronics & communications engineering [TJ]

View full details