ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings: IFIP Advances in Information and Communication Technology, cartea 455
Editat de Hannes Federrath, Dieter Gollmannen Limba Engleză Hardback – 21 mai 2015
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 628.19 lei 39-44 zile | |
Springer International Publishing – 17 oct 2016 | 628.19 lei 39-44 zile | |
Hardback (1) | 640.19 lei 39-44 zile | |
Springer International Publishing – 21 mai 2015 | 640.19 lei 39-44 zile |
Din seria IFIP Advances in Information and Communication Technology
- 20% Preț: 170.51 lei
- 20% Preț: 615.74 lei
- 20% Preț: 327.52 lei
- Preț: 382.45 lei
- 20% Preț: 323.38 lei
- 20% Preț: 328.15 lei
- 20% Preț: 503.41 lei
- 17% Preț: 523.40 lei
- 20% Preț: 502.06 lei
- 17% Preț: 488.96 lei
- 20% Preț: 501.04 lei
- 20% Preț: 403.20 lei
- 20% Preț: 1162.12 lei
- 20% Preț: 1239.38 lei
- 18% Preț: 1180.67 lei
- 20% Preț: 1233.36 lei
- 18% Preț: 1177.76 lei
- 18% Preț: 916.91 lei
- 18% Preț: 917.08 lei
- 18% Preț: 909.20 lei
- 18% Preț: 912.36 lei
- 15% Preț: 621.05 lei
- 18% Preț: 923.74 lei
- 20% Preț: 1239.23 lei
- 20% Preț: 960.84 lei
- 18% Preț: 913.26 lei
- 20% Preț: 1235.12 lei
- 20% Preț: 958.15 lei
- 15% Preț: 621.37 lei
- 20% Preț: 1228.29 lei
- 20% Preț: 1849.95 lei
- 20% Preț: 1237.17 lei
- 18% Preț: 920.43 lei
- 18% Preț: 910.85 lei
- 18% Preț: 1177.92 lei
- 20% Preț: 1229.40 lei
- 18% Preț: 916.91 lei
- 18% Preț: 912.06 lei
- 20% Preț: 1243.52 lei
- 18% Preț: 919.96 lei
- 20% Preț: 621.37 lei
- 18% Preț: 1188.40 lei
- 20% Preț: 1235.75 lei
- 18% Preț: 1184.32 lei
- 20% Preț: 955.45 lei
- 20% Preț: 1240.04 lei
- 20% Preț: 949.76 lei
- 18% Preț: 1763.71 lei
- 20% Preț: 1243.19 lei
Preț: 640.19 lei
Preț vechi: 800.24 lei
-20% Nou
Puncte Express: 960
Preț estimativ în valută:
122.52€ • 129.26$ • 102.11£
122.52€ • 129.26$ • 102.11£
Carte tipărită la comandă
Livrare economică 30 decembrie 24 - 04 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319184661
ISBN-10: 3319184660
Pagini: 646
Ilustrații: XVI, 646 p. 156 illus.
Dimensiuni: 155 x 235 x 40 mm
Greutate: 1.1 kg
Ediția:2015
Editura: Springer International Publishing
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:Cham, Switzerland
ISBN-10: 3319184660
Pagini: 646
Ilustrații: XVI, 646 p. 156 illus.
Dimensiuni: 155 x 235 x 40 mm
Greutate: 1.1 kg
Ediția:2015
Editura: Springer International Publishing
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:Cham, Switzerland
Public țintă
ResearchCuprins
O-PSI: Delegated Private Set Intersection on Outsourced Datasets.- Flexible and Robust Privacy-Preserving Implicit Authentication.- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack.- POSN: A Personal Online Social Network.- Verifying Observational Determinism.- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing.- Enforcing Usage Constraints on Credentials for Web Applications.- A Survey of Alerting Websites: Risks and Solutions.- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant.- Enhancing Passwords Security Using Deceptive Covert Communication.- Information Sharing and User Privacy in the Third-party Identity Management Landscape.- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems.- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control.- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems.- Authenticated File Broadcast Protocol.- Automated Classification of C&C Connections Through Malware URL Clustering.- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications.- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach.- Practice-Based Discourse Analysis of InfoSec Policies.- Understanding Collaborative Challenges in IT Security Preparedness Exercises.- Social Groupings and Information Security Obedience Within Organizations.- Attack Trees with Sequential Conjunction.- Enhancing the Security of Image CAPTCHAs Through Noise Addition.- SHRIFT System-Wide HybRid Information Flow Tracking.- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries.- Exploit Generation for Information Flow Leaks in Object-Oriented Programs.- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference.- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach.- Integrity for Approximate Joins on Untrusted Computational Servers.- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers.- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment.- A Secure Exam Protocol Without Trusted Parties.- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis.- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases.- An Empirical Study on Android for Saving Non-shared Data on Public Storage.- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation.- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps.- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration.- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems.- Securing BACnet’s Pitfalls.- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.
Caracteristici
Includes supplementary material: sn.pub/extras