Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China: IFIP Advances in Information and Communication Technology, cartea 47
Editat de Sihan Qing, Jan H. P. Eloffen Limba Engleză Paperback – 6 feb 2013
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 1282.98 lei 6-8 săpt. | |
Springer Us – 6 feb 2013 | 1282.98 lei 6-8 săpt. | |
Hardback (1) | 1289.59 lei 6-8 săpt. | |
Springer Us – 31 iul 2000 | 1289.59 lei 6-8 săpt. |
Din seria IFIP Advances in Information and Communication Technology
- 20% Preț: 170.51 lei
- 20% Preț: 615.74 lei
- 20% Preț: 340.32 lei
- Preț: 397.38 lei
- 20% Preț: 336.02 lei
- 20% Preț: 340.98 lei
- 20% Preț: 503.41 lei
- 17% Preț: 523.40 lei
- 20% Preț: 502.06 lei
- 17% Preț: 488.96 lei
- 20% Preț: 501.04 lei
- 20% Preț: 403.20 lei
- 15% Preț: 708.83 lei
- 20% Preț: 1162.12 lei
- 20% Preț: 1288.25 lei
- 18% Preț: 1227.21 lei
- 20% Preț: 1282.00 lei
- 18% Preț: 1224.18 lei
- 18% Preț: 953.03 lei
- 18% Preț: 953.20 lei
- 18% Preț: 944.99 lei
- 18% Preț: 948.29 lei
- 15% Preț: 645.47 lei
- 18% Preț: 960.13 lei
- 20% Preț: 1288.11 lei
- 20% Preț: 998.70 lei
- 18% Preț: 949.23 lei
- 20% Preț: 1283.81 lei
- 20% Preț: 995.89 lei
- 15% Preț: 645.79 lei
- 20% Preț: 1276.74 lei
- 20% Preț: 1922.99 lei
- 20% Preț: 1285.97 lei
- 18% Preț: 956.69 lei
- 18% Preț: 946.72 lei
- 18% Preț: 1224.36 lei
- 20% Preț: 1277.89 lei
- 18% Preț: 953.03 lei
- 18% Preț: 947.98 lei
- 20% Preț: 1292.54 lei
- 18% Preț: 956.18 lei
- 20% Preț: 645.79 lei
- 18% Preț: 1235.25 lei
- 20% Preț: 1284.47 lei
- 18% Preț: 1231.01 lei
- 20% Preț: 993.09 lei
- 20% Preț: 1288.94 lei
- 20% Preț: 987.17 lei
- 18% Preț: 1833.33 lei
Preț: 1282.98 lei
Preț vechi: 1603.73 lei
-20% Nou
Puncte Express: 1924
Preț estimativ în valută:
245.55€ • 255.36$ • 205.48£
245.55€ • 255.36$ • 205.48£
Carte tipărită la comandă
Livrare economică 15-29 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781475754797
ISBN-10: 1475754795
Pagini: 528
Ilustrații: XVIII, 514 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.73 kg
Ediția:Softcover reprint of the original 1st ed. 2000
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
ISBN-10: 1475754795
Pagini: 528
Ilustrații: XVIII, 514 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.73 kg
Ediția:Softcover reprint of the original 1st ed. 2000
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
1. IT Security Certification and Criteria.- 2. Information Security: Process Evaluation and Product Evaluation.- 3. Managing Information Security in Healthcare — an Action Research Experience.- 4. From Trusted Information Security Controls to a Trusted Information Security Environment.- 5. A Qualitative Approach to Information Availability.- 6. A Postgraduate Programme on Information and Communication Systems Security.- 7. Information Security Management through Measurement.- 8. The Defense Framework for Large-scale Computer Network System.- 9. Identity Mapping: An Approach to Unravel Enterprise Security Management Policies.- 10. Independent Policy Oriented Layering of Security Services.- 11. Reducing Computer Fraud through Situational Crime Prevention.- 12. Policies for Construction of Information Systems’ Security Guidelines: Five Approaches.- 13. ‘DNA-proofing’ for Computer Systems — A New Approach to Computer Security?.- 14. Using Smart Cards in an Educational Environment: Services and Security Features.- 15. MASS: Model for an Auditing Security System.- 16. Classifying Information for External Release.- 17. Using Mobile Agent Results to Create Hard-To-Detect Computer Viruses.- 18. CARDS: A Distributed System for Detecting Coordinated Attacks.- 19. Robust Audio Watermarking based on Secure Spread Spectrum and Auditory Perception Model.- 20. A Simple and Efficient Approach to Verifying Cryptographic Protocols.- 21. Power Analysis of RC6 and Serpent.- 22. A Simple Algorithm for Computing Several Sequences Synthesis.- 23. GSFS — A New Group-Aware Cryptographic File System.- 24. Robustness-Agile Encryptor for ATM Networks.- 25. Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties.- 26. A New Serial/Parallel Architecture for a LowPower Modular Multiplier.- 27. Defending Against Null Calls Stream Attacks by Using a Double- Threshold Dynamic Filter.- 28. A Multi-party Non-repudiation Protocol.- 29. Analysis and Design of E-voting Protocol.- 30. Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents’ Community.- 31. Towards Network Denial of Service Resistant Protocols.- 32. A Generic Graphical Specification Environment for Security Protocol Modelling.- 33. Anonymous Electronic Voting System with Non-Transferable Voting Passes.- 34. Improving Packet Filters Management through Automatic and Dynamic Schemes.- 35. A Context-Sensitive Access Control Model and Prototype Implementation.- 36. Regulating Access to Semistructured Information on the Web.- 37. On the Practical Feasibility of Secure Distributed Computing: A Case Study.- 38. Elements of A Language for Role-Based Access Control.- 39. Disallowing Unauthorized State Changes of Distributed Shared Objects.- 40. Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network.- 41. On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Nondescriptive Foundations.- 42. Information Warfare: Fact or Fiction?.- 43. Enforcing Privacy by Withholding Private Information.- 44. The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet Age.- 45. A Framework for Electronic Commerce Security.- 46. Electronic Payment Systems with Fair On-line Verification.- 47. Fair Electronic Cash Systems with Multiple Banks.- 48. Securing Mobile Agents for Electronic Commerce: an Experiment.- 49. A Flexible Management Framework for Certificate Status Validation.- 50. A Security Architecture for Electronic CommerceApplications.- 51. On the Development of the Advanced Encryption Standard.- 52. Public Key Infrastructure: Managing the e-Business Security.- Index of contributors.