<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>02814cam a22003014a 4500</leader>
  <controlfield tag="001">16302617</controlfield>
  <controlfield tag="005">20201128021151.0</controlfield>
  <controlfield tag="008">100625s2011    xxka   frb   f001 0 eng d</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">2010027364</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9780521119320 (hardback)</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="a">DLC</subfield>
    <subfield code="c">DLC</subfield>
    <subfield code="d">DLC</subfield>
    <subfield code="d">EG-ScBUE</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">005.8</subfield>
    <subfield code="2">22</subfield>
    <subfield code="b">ALP</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Alpcan, Tansu,</subfield>
    <subfield code="d">1975-</subfield>
    <subfield code="9">36990</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Network security :</subfield>
    <subfield code="b">a decision and game-theoretic approach /</subfield>
    <subfield code="c">Tansu Alpcan, Tamer Basar.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Cambridge, United Kingdom ;</subfield>
    <subfield code="a">New York, United States :</subfield>
    <subfield code="b">Cambridge University Press,</subfield>
    <subfield code="c">2011.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xiv, 314 p. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">25 cm.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">Index : p. 312-314.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
    <subfield code="a">Bibliography : p. [302]-311.</subfield>
  </datafield>
  <datafield tag="505" ind1="8" ind2=" ">
    <subfield code="a">Machine generated contents note : Preface ; Notation ; Part I. Introduction : 1. Introduction ; 2. Network security concepts ; Part II. Security Games : 3. Deterministic security games ; 4. Stochastic security games ; 5. Security games with information limitations ; Part III. Decision Making for Network Security : 6. Security risk management ; 7. Resource allocation for security ; 8. Usability, trust, and privacy ; Part IV. Security Attack and Intrusion Detection : 9. Machine learning for intrusion and anomaly detection ; 10. Hypothesis testing for attack detection ; A. Optimization, game theory, and optimal &amp; robust control ; References ; Index.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">"Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security"-</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">"Network security is an important, challenging, and multi-dimensional research field.In its study, theory and practice should function together as parts of a feedback loop.Game, optimization, and control theories, among others, provide a mathematical foundation to formalize the multitude of decision-making processes in network security. The analytical approaches and quantitative frameworks presented lead to better allocation of limited resources and result in more informed responses to security problems in complex networked systems and organizations"-</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer networks</subfield>
    <subfield code="x">Security measures</subfield>
    <subfield code="9">2634</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Game theory</subfield>
    <subfield code="9">3340</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="b">ENGELC</subfield>
    <subfield code="c">December2014</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2=" ">
    <subfield code="v">reading book</subfield>
    <subfield code="9">34232</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Basak, T. K.</subfield>
    <subfield code="9">7821</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="k">005.8 ALP</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">18801</subfield>
    <subfield code="d">18773</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">Baccah</subfield>
    <subfield code="a">MAIN</subfield>
    <subfield code="b">MAIN</subfield>
    <subfield code="c">LOW</subfield>
    <subfield code="d">2014-12-18</subfield>
    <subfield code="e">purchase</subfield>
    <subfield code="g">828.00</subfield>
    <subfield code="h">21291</subfield>
    <subfield code="l">1</subfield>
    <subfield code="o">005.8 ALP</subfield>
    <subfield code="p">000037218</subfield>
    <subfield code="r">2025-07-15 00:00:00</subfield>
    <subfield code="s">2015-11-11</subfield>
    <subfield code="v">1035.00</subfield>
    <subfield code="y">BB</subfield>
  </datafield>
</record>
