Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, from 6 to 9 September 2004.: NATO Science Series II: Mathematics, Physics and Chemistry, cartea 196
Editat de Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenkoen Limba Engleză Paperback – 19 mai 2005
On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security.
Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not "Should we do something for enhancing our digital assets security", the question is "How to do it".
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 638.36 lei 6-8 săpt. | |
SPRINGER NETHERLANDS – 19 mai 2005 | 638.36 lei 6-8 săpt. | |
Hardback (1) | 632.00 lei 6-8 săpt. | |
SPRINGER NETHERLANDS – 19 mai 2005 | 632.00 lei 6-8 săpt. |
Din seria NATO Science Series II: Mathematics, Physics and Chemistry
- Preț: 260.24 lei
- 18% Preț: 1224.05 lei
- 15% Preț: 619.94 lei
- 18% Preț: 1778.13 lei
- 18% Preț: 1188.87 lei
- 15% Preț: 625.30 lei
- 18% Preț: 921.47 lei
- 15% Preț: 631.74 lei
- 18% Preț: 1188.57 lei
- 18% Preț: 923.74 lei
- 18% Preț: 1179.31 lei
- 15% Preț: 641.20 lei
- 18% Preț: 1765.39 lei
- 15% Preț: 616.49 lei
- 18% Preț: 918.29 lei
- 18% Preț: 1180.81 lei
- 15% Preț: 621.68 lei
- 18% Preț: 912.66 lei
- Preț: 385.07 lei
- 18% Preț: 923.43 lei
- 18% Preț: 908.42 lei
- 18% Preț: 1768.57 lei
- 18% Preț: 1176.12 lei
- 18% Preț: 904.32 lei
- 18% Preț: 914.63 lei
- 18% Preț: 921.17 lei
Preț: 638.36 lei
Preț vechi: 797.95 lei
-20% Nou
Puncte Express: 958
Preț estimativ în valută:
122.17€ • 128.89$ • 101.81£
122.17€ • 128.89$ • 101.81£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781402033803
ISBN-10: 140203380X
Pagini: 396
Ilustrații: X, 382 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.91 kg
Ediția:2005
Editura: SPRINGER NETHERLANDS
Colecția Springer
Seria NATO Science Series II: Mathematics, Physics and Chemistry
Locul publicării:Dordrecht, Netherlands
ISBN-10: 140203380X
Pagini: 396
Ilustrații: X, 382 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.91 kg
Ediția:2005
Editura: SPRINGER NETHERLANDS
Colecția Springer
Seria NATO Science Series II: Mathematics, Physics and Chemistry
Locul publicării:Dordrecht, Netherlands
Public țintă
ResearchCuprins
General Security Issues.- IT Security Development.- A Case for Public and Private Review of Developing it Security Standards.- Assuring Critical Information Infrastructure.- Systemic Challenges for Critical Information Infrastructure Protection.- Decentralized Energy Supply to Secure Computer Systems.- Dependability.- Safety Analysis Methods—Software Development Questions.- Trust Case—A Case for Trustworthiness of IT Infrastructures.- Dependability, Structure, and Infrastructure.- Design for Safety and Security of Complex Embedded Systems: A Unified Approach.- Networks.- Design of Distributed Sensor Networks for Security and Defense.- A Distributed Approach to the Recognition of Geographically Located IP Devices.- Situational Awareness and Network Traffic Analysis.- Early Warning Information Systems and Secure Access Control.- Honeynets: Foundations for the Development of Early Warning Information Systems.- IRIS Biometrics for Secure Remote Access.- New Directions in Access Control.- Cryptography.- Improved Block Cipher Counter Mode of Operation Schemes.- Electronic Signature in Real World.- A Note on Two Significant Developments in Cyberspace Security and Defense.- A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol.- Intrusion Detection.- An Infrastructure for Distributed Event Acquisition.- Some Aspects of Neural Network Approach for Intrusion Detection.
Caracteristici
Wide spectrum of information security topics Written by experts in the field with practical experience Authors share valuable experiences from real life Suitable for high level managment responsible for information security and technical persons designing and implementing security systems Significant amount of information published first time