Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings: Lecture Notes in Computer Science, cartea 3685
Editat de Vladimir Gorodetsky, Igor Kotenko, Victor Skorminen Limba Engleză Paperback – 12 sep 2005
Din seria Lecture Notes in Computer Science
- 20% Preț: 1040.03 lei
- 20% Preț: 333.46 lei
- 20% Preț: 335.08 lei
- 20% Preț: 444.17 lei
- 20% Preț: 238.01 lei
- 20% Preț: 333.46 lei
- 20% Preț: 438.69 lei
- Preț: 440.52 lei
- 20% Preț: 336.71 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 567.60 lei
- 20% Preț: 571.63 lei
- 15% Preț: 568.74 lei
- 17% Preț: 427.22 lei
- 20% Preț: 641.78 lei
- 20% Preț: 307.71 lei
- 20% Preț: 574.05 lei
- 20% Preț: 579.56 lei
- Preț: 373.56 lei
- 20% Preț: 330.23 lei
- 20% Preț: 649.49 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 1386.07 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1003.66 lei
- 20% Preț: 256.27 lei
- 20% Preț: 632.22 lei
- 20% Preț: 575.48 lei
- 20% Preț: 747.79 lei
- 20% Preț: 1053.45 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 346.40 lei
- 20% Preț: 809.19 lei
- Preț: 402.62 lei
- 20% Preț: 584.40 lei
- 20% Preț: 1159.14 lei
- 20% Preț: 747.79 lei
- Preț: 389.48 lei
- 20% Preț: 343.16 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 335.56 lei
Preț vechi: 419.45 lei
-20% Nou
Puncte Express: 503
Preț estimativ în valută:
64.22€ • 66.71$ • 53.34£
64.22€ • 66.71$ • 53.34£
Carte tipărită la comandă
Livrare economică 01-15 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540291138
ISBN-10: 354029113X
Pagini: 500
Ilustrații: XIV, 482 p.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.69 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Computer Communication Networks and Telecommunications
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 354029113X
Pagini: 500
Ilustrații: XIV, 482 p.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.69 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Computer Communication Networks and Telecommunications
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Papers.- Self-managed Cells for Ubiquitous Systems.- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures.- Rule-Based Topological Vulnerability Analysis.- Models and Analysis of Active Worm Defense.- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes.- Mathematical Models, Architectures and Protocols for Computer Network Security.- Calibrating Entropy Functions Applied to Computer Networks.- A Passive External Web Surveillance Technique for Private Networks.- A Secure Way to Combine IPsec, NAT & DHCP.- A Generic Model for Analyzing Security Protocols.- Networks, Markov Lie Monoids, and Generalized Entropy.- Trust by Workflow in Autonomic Communication.- An Ontology-Based Approach to Information Systems Security Management.- Authentication, Authorization and Access Control.- Safety Problems in Access Control with Temporal Constraints.- A Modal Logic for Role-Based Access Control.- Unique User-Generated Digital Pseudonyms.- Information Flow Analysis, Covert Channels and Trust Management.- A Probabilistic Property-Specific Approach to Information Flow.- Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata.- Detection of Illegal Information Flow.- Towards More Controllable and Practical Delegation.- Security Policy and Operating System Security.- Policy-Driven Routing Management Using CIM.- Secure Hybrid Operating System “Linux over Fenix”.- A Formal Description of SECIMOS Operating System.- Threat Modeling, Vulnerability Assessment and Network Forensics.- A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures.- Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network LifeCycle.- A Temporal Logic-Based Model for Forensic Investigation in Networked System Security.- Vulnerabilities Detection in the Configurations of MS Windows Operating System.- Intrusion Detection.- Hybrid Intrusion Detection Model Based on Ordered Sequences.- Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems.- Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks.- A Formal Immune Network and Its Implementation for On-line Intrusion Detection.- Short Papers.- Foundation for a Time Interval Access Control Model.- Developing an Insider Threat Model Using Functional Decomposition.- An XML-Seamless Policy Based Management Framework.- Statistical Covert Channels Through PROXY Server.- Encoding Private Key in Fingerprint.- A New Scheme for the Location Information Protection in Mobile Communication Environments.- Region Protection/Restoration Scheme in Survivable Networks.- Massive Data Mining for Polymorphic Code Detection.- Key Escrow with Tree-Based Access Structure.- Security Checker Architecture for Policy-Based Security Management.- An Efficient Access Control Model Utilized the Attribute Certificate Structuring.- Secure Protected Password Change Scheme.