A Design Methodology for Computer Security Testing
The book collects 3 years of researches in the penetration testing security field. It does not describe underground or fancy techniques, it is most focused on the state of the art in penetration testing methodologies. In other words, if you need to test a system, how do you do ? What is the first step ? What tools can be used ? what is the path to follow in order to find flaws ? The book shows many real world examples on how the described methodology has been used. For example: penetration testing on electronic voting machines, how malware did use the describe methodology to bypass common security mechanisms and attacks to reputation systems.
Hardcover: 358 pages
Editor: LULU PR (2013)
Designing A New Electronic Voting System: Towards electronic voting systems
Voting to elect representatives in a democracy is a very sensitive process. It is also a quite complex one, so it is natural to think about computer-based systems to automate the collection and counting of ballots. So far, reproducing apparently simple features of paper- based voting, like the ability of put together anonymity and accountability, has proved to be a more difficult task than expected. This book illustrates a novel architecture based on modern coordination paradigms, which exhibits remarkable resiliency and scalability properties. A programmable tuple center (Glue) acts both as storage for ballots and as coordination platform among the distributed voting machines and counting services. By taking the storage burden away from the countless machines spread throughout the country, and by requiring them a verifiable behavior during the interactions, the Glue can guarantee security without having to rely on their integrity. Immediate access to all the real- time data allows easy verification of its integrity and consistency by anyone authorized.
Hardcover: 60 pages
Editor: LAP LAMBERT Academic Publishing (December 7, 2010