Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings: Lecture Notes in Computer Science, cartea 3439
Editat de Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhouen Limba Engleză Paperback – 5 apr 2005
Din seria Lecture Notes in Computer Science
- 20% Preț: 1005.39 lei
- 20% Preț: 322.44 lei
- 20% Preț: 324.00 lei
- 20% Preț: 315.19 lei
- 20% Preț: 238.01 lei
- 20% Preț: 554.98 lei
- 20% Preț: 322.44 lei
- 20% Preț: 438.69 lei
- 20% Preț: 325.58 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 1339.86 lei
- 20% Preț: 782.28 lei
- 17% Preț: 360.19 lei
- 20% Preț: 620.45 lei
- 20% Preț: 307.71 lei
- 20% Preț: 550.29 lei
- 20% Preț: 560.32 lei
- 20% Preț: 319.32 lei
- 15% Preț: 549.86 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 548.74 lei
- 20% Preț: 172.69 lei
- 20% Preț: 611.22 lei
- 20% Preț: 970.25 lei
- 20% Preț: 552.64 lei
- 20% Preț: 315.78 lei
- 20% Preț: 315.78 lei
- 20% Preț: 722.90 lei
- 20% Preț: 722.90 lei
- 20% Preț: 301.95 lei
- 20% Preț: 504.57 lei
- 20% Preț: 1120.51 lei
- 20% Preț: 369.12 lei
- 20% Preț: 334.94 lei
- 20% Preț: 552.64 lei
- Preț: 389.31 lei
- 20% Preț: 564.99 lei
- 20% Preț: 724.49 lei
- 20% Preț: 552.64 lei
- 20% Preț: 1018.35 lei
- 20% Preț: 331.82 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 375.63 lei
Nou
Puncte Express: 563
Preț estimativ în valută:
71.93€ • 77.80$ • 59.94£
71.93€ • 77.80$ • 59.94£
Carte tipărită la comandă
Livrare economică 11-25 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540255840
ISBN-10: 3540255842
Pagini: 440
Ilustrații: XII, 428 p.
Dimensiuni: 152 x 229 x 23 mm
Greutate: 0.61 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540255842
Pagini: 440
Ilustrații: XII, 428 p.
Dimensiuni: 152 x 229 x 23 mm
Greutate: 0.61 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Network Security.- Risk Assessment of Production Networks Using Honeynets – Some Practical Experience.- POSSET – Policy-Driven Secure Session Transfer.- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach.- Robust Routing in Malicious Environment for Ad Hoc Networks.- Cryptographic Techniques I.- Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation.- Tracing Traitors by Guessing Secrets. The q-Ary Case.- Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications.- Countermeasures for Preventing Comb Method Against SCA Attacks.- Secure Architecture I.- An Email Worm Vaccine Architecture.- Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.- Security On-demand Architecture with Multiple Modules Support.- Measuring Resistance to Social Engineering.- Access Control.- Conformance Checking of RBAC Policy and its Implementation.- A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications.- A Task-Oriented Access Control Model for WfMS.- Intrusion Detection.- A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection.- Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.- Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.- Model Redundancy vs. Intrusion Detection.- Applications and Case Studies.- An Open Approach for Designing Secure Electronic Immobilizers.- An Empirical Study on the Usability of Logout in a Single Sign-on System.- Secure Software Delivery and Installation in Embedded Systems.- A Restricted Multi-show Credential System and Its Application on E-Voting.- Secure ArchitectureII.- Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks.- Using Trust for Restricted Delegation in Grid Environments.- Computer Vulnerability Evaluation Using Fault Tree Analysis.- An Identity-Based Grid Security Infrastructure Model.- Data Security.- Towards Multilateral-Secure DRM Platforms.- Hiding Data in Binary Images.- Performance Analysis of CDMA-Based Watermarking with Quantization Scheme.- Protecting Mass Data Basing on Small Trusted Agent.- Cryptographic Techniques II.- On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes.- Token-Controlled Public Key Encryption.- A New Class of Codes for Fingerprinting Schemes.- t-Out-of-n String/Bit Oblivious Transfers Revisited.