Thumbnail
Access Restriction
Subscribed

Author Denning, Peter J.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Protecting computing systems and networks from attackers and data theft is an enormously complicated problem. The individual operating systems are complex (typically more than 40 million lines of code), they are connected to an enormous Internet (on order of 1 billion hosts), and the whole network is heavily populated (more than 2.3 billion users). Hunting down and patching vulnerabilities is a losing game.
Description Affiliation: <i>Ubiquity</i> and Cebrowski Institute at the Naval Postgraduate School in Monterey, CA (Denning, Peter J.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2015-06-29
Publisher Place New York
Journal Ubiquity (UBIQ)
Volume Number 2012
Issue Number May
Page Count 10
Starting Page 1
Ending Page 10


Open content in new tab

   Open content in new tab
Source: ACM Digital Library