Loading...
Please wait, while we are loading the content...
Similar Documents
- Computer Security
| Content Provider | Scilit |
|---|---|
| Author | Tamassia, Roberto |
| Copyright Year | 2013 |
| Description | As the number of devices connected to the Internet continues to grow rapidly and software systems are being increasingly deployed on the Web, security and privacy have become crucial properties for networks and applications. Because of the complexity and subtlety of cryptographic methods and protocols, software architects and developers often fail to incorporate security principles in their designs and implementations. Also, most users have minimal understanding of security threats. While several tools for developers, system administrators, and security analysts are available, these tools typically provide information in the form of textual logs or tables, which are cumbersome to analyze. Thus, in recent years, the field of security visualization has emerged to provide novel ways to display securityrelated information, thus making such information easier to understand. Book Name: Handbook of Graph Drawing and Visualization |
| Related Links | https://content.taylorfrancis.com/books/download?dac=C2009-0-12758-5&isbn=9780429149221&doi=10.1201/b15385-24&format=pdf |
| Ending Page | 695 |
| Page Count | 28 |
| Starting Page | 668 |
| DOI | 10.1201/b15385-24 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2013-08-19 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Handbook of Graph Drawing and Visualization Computation Theory and Mathematics Software Systems Security Analysts System Administrators Devices Connected Increasingly Deployed Provide Novel Securityrelated Information Textual Logs |
| Content Type | Text |
| Resource Type | Chapter |