Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China: IFIP Advances in Information and Communication Technology, cartea 47
Editat de Sihan Qing, Jan H. P. Eloffen Limba Engleză Paperback – 6 feb 2013
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 1256.94 lei 6-8 săpt. | |
Springer Us – 6 feb 2013 | 1256.94 lei 6-8 săpt. | |
Hardback (1) | 1263.43 lei 6-8 săpt. | |
Springer Us – 31 iul 2000 | 1263.43 lei 6-8 săpt. |
Din seria IFIP Advances in Information and Communication Technology
- 20% Preț: 170.51 lei
- 20% Preț: 615.74 lei
- 20% Preț: 333.46 lei
- Preț: 389.39 lei
- 20% Preț: 329.26 lei
- 20% Preț: 334.10 lei
- 20% Preț: 503.41 lei
- 17% Preț: 523.40 lei
- 20% Preț: 502.06 lei
- 17% Preț: 488.96 lei
- 20% Preț: 501.04 lei
- 20% Preț: 403.20 lei
- 20% Preț: 1162.12 lei
- 20% Preț: 1262.11 lei
- 18% Preț: 1202.31 lei
- 20% Preț: 1255.99 lei
- 18% Preț: 1199.35 lei
- 18% Preț: 933.71 lei
- 18% Preț: 933.88 lei
- 18% Preț: 925.84 lei
- 18% Preț: 929.07 lei
- 15% Preț: 632.42 lei
- 18% Preț: 940.66 lei
- 20% Preț: 1261.97 lei
- 20% Preț: 978.45 lei
- 18% Preț: 930.00 lei
- 20% Preț: 1257.76 lei
- 20% Preț: 975.71 lei
- 15% Preț: 632.73 lei
- 20% Preț: 1250.82 lei
- 20% Preț: 1883.92 lei
- 20% Preț: 1259.86 lei
- 18% Preț: 937.29 lei
- 18% Preț: 927.55 lei
- 18% Preț: 1199.52 lei
- 20% Preț: 1251.96 lei
- 18% Preț: 933.71 lei
- 18% Preț: 928.77 lei
- 20% Preț: 1266.32 lei
- 18% Preț: 936.81 lei
- 20% Preț: 632.73 lei
- 18% Preț: 1210.19 lei
- 20% Preț: 1258.40 lei
- 18% Preț: 1206.05 lei
- 20% Preț: 972.96 lei
- 20% Preț: 1262.79 lei
- 20% Preț: 967.16 lei
- 18% Preț: 1796.10 lei
- 20% Preț: 1265.99 lei
Preț: 1256.94 lei
Preț vechi: 1571.18 lei
-20% Nou
Puncte Express: 1885
Preț estimativ în valută:
240.59€ • 252.27$ • 198.79£
240.59€ • 252.27$ • 198.79£
Carte tipărită la comandă
Livrare economică 29 ianuarie-12 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781475754797
ISBN-10: 1475754795
Pagini: 528
Ilustrații: XVIII, 514 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.73 kg
Ediția:Softcover reprint of the original 1st ed. 2000
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
ISBN-10: 1475754795
Pagini: 528
Ilustrații: XVIII, 514 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.73 kg
Ediția:Softcover reprint of the original 1st ed. 2000
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
1. IT Security Certification and Criteria.- 2. Information Security: Process Evaluation and Product Evaluation.- 3. Managing Information Security in Healthcare — an Action Research Experience.- 4. From Trusted Information Security Controls to a Trusted Information Security Environment.- 5. A Qualitative Approach to Information Availability.- 6. A Postgraduate Programme on Information and Communication Systems Security.- 7. Information Security Management through Measurement.- 8. The Defense Framework for Large-scale Computer Network System.- 9. Identity Mapping: An Approach to Unravel Enterprise Security Management Policies.- 10. Independent Policy Oriented Layering of Security Services.- 11. Reducing Computer Fraud through Situational Crime Prevention.- 12. Policies for Construction of Information Systems’ Security Guidelines: Five Approaches.- 13. ‘DNA-proofing’ for Computer Systems — A New Approach to Computer Security?.- 14. Using Smart Cards in an Educational Environment: Services and Security Features.- 15. MASS: Model for an Auditing Security System.- 16. Classifying Information for External Release.- 17. Using Mobile Agent Results to Create Hard-To-Detect Computer Viruses.- 18. CARDS: A Distributed System for Detecting Coordinated Attacks.- 19. Robust Audio Watermarking based on Secure Spread Spectrum and Auditory Perception Model.- 20. A Simple and Efficient Approach to Verifying Cryptographic Protocols.- 21. Power Analysis of RC6 and Serpent.- 22. A Simple Algorithm for Computing Several Sequences Synthesis.- 23. GSFS — A New Group-Aware Cryptographic File System.- 24. Robustness-Agile Encryptor for ATM Networks.- 25. Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties.- 26. A New Serial/Parallel Architecture for a LowPower Modular Multiplier.- 27. Defending Against Null Calls Stream Attacks by Using a Double- Threshold Dynamic Filter.- 28. A Multi-party Non-repudiation Protocol.- 29. Analysis and Design of E-voting Protocol.- 30. Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents’ Community.- 31. Towards Network Denial of Service Resistant Protocols.- 32. A Generic Graphical Specification Environment for Security Protocol Modelling.- 33. Anonymous Electronic Voting System with Non-Transferable Voting Passes.- 34. Improving Packet Filters Management through Automatic and Dynamic Schemes.- 35. A Context-Sensitive Access Control Model and Prototype Implementation.- 36. Regulating Access to Semistructured Information on the Web.- 37. On the Practical Feasibility of Secure Distributed Computing: A Case Study.- 38. Elements of A Language for Role-Based Access Control.- 39. Disallowing Unauthorized State Changes of Distributed Shared Objects.- 40. Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network.- 41. On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Nondescriptive Foundations.- 42. Information Warfare: Fact or Fiction?.- 43. Enforcing Privacy by Withholding Private Information.- 44. The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet Age.- 45. A Framework for Electronic Commerce Security.- 46. Electronic Payment Systems with Fair On-line Verification.- 47. Fair Electronic Cash Systems with Multiple Banks.- 48. Securing Mobile Agents for Electronic Commerce: an Experiment.- 49. A Flexible Management Framework for Certificate Status Validation.- 50. A Security Architecture for Electronic CommerceApplications.- 51. On the Development of the Advanced Encryption Standard.- 52. Public Key Infrastructure: Managing the e-Business Security.- Index of contributors.