Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK: IFIP Advances in Information and Communication Technology, cartea 128
Editat de Ehud Gudes, Sujeet Shenoien Limba Engleză Paperback – 2 mar 2013
-Database Security;
-XML Security;
-Data Mining and Inference;
-Multimedia System Security;
-Network Security;
-Public Key Infrastructure;
-Formal Methods and Protocols;
-Security and Privacy.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 648.95 lei 6-8 săpt. | |
Springer Us – 2 mar 2013 | 648.95 lei 6-8 săpt. | |
Hardback (1) | 655.35 lei 6-8 săpt. | |
Springer Us – 31 iul 2003 | 655.35 lei 6-8 săpt. |
Din seria IFIP Advances in Information and Communication Technology
- 20% Preț: 170.51 lei
- 20% Preț: 615.74 lei
- 20% Preț: 340.32 lei
- Preț: 397.38 lei
- 20% Preț: 336.02 lei
- 20% Preț: 340.98 lei
- 20% Preț: 503.41 lei
- 17% Preț: 523.40 lei
- 20% Preț: 502.06 lei
- 17% Preț: 488.96 lei
- 20% Preț: 501.04 lei
- 20% Preț: 403.20 lei
- 15% Preț: 708.83 lei
- 20% Preț: 1162.12 lei
- 20% Preț: 1288.25 lei
- 18% Preț: 1227.21 lei
- 20% Preț: 1282.00 lei
- 18% Preț: 1224.18 lei
- 18% Preț: 953.03 lei
- 18% Preț: 953.20 lei
- 18% Preț: 944.99 lei
- 18% Preț: 948.29 lei
- 15% Preț: 645.47 lei
- 18% Preț: 960.13 lei
- 20% Preț: 1288.11 lei
- 20% Preț: 998.70 lei
- 18% Preț: 949.23 lei
- 20% Preț: 1283.81 lei
- 20% Preț: 995.89 lei
- 15% Preț: 645.79 lei
- 20% Preț: 1276.74 lei
- 20% Preț: 1922.99 lei
- 20% Preț: 1285.97 lei
- 18% Preț: 956.69 lei
- 18% Preț: 946.72 lei
- 18% Preț: 1224.36 lei
- 20% Preț: 1277.89 lei
- 18% Preț: 953.03 lei
- 18% Preț: 947.98 lei
- 20% Preț: 1292.54 lei
- 18% Preț: 956.18 lei
- 20% Preț: 645.79 lei
- 18% Preț: 1235.25 lei
- 20% Preț: 1284.47 lei
- 18% Preț: 1231.01 lei
- 20% Preț: 993.09 lei
- 20% Preț: 1288.94 lei
- 20% Preț: 987.17 lei
- 18% Preț: 1833.33 lei
Preț: 648.95 lei
Preț vechi: 811.19 lei
-20% Nou
Puncte Express: 973
Preț estimativ în valută:
124.20€ • 129.32$ • 104.96£
124.20€ • 129.32$ • 104.96£
Carte tipărită la comandă
Livrare economică 10-24 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781475764130
ISBN-10: 1475764138
Pagini: 368
Ilustrații: XXII, 350 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.51 kg
Ediția:Softcover reprint of the original 1st ed. 2003
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
ISBN-10: 1475764138
Pagini: 368
Ilustrații: XXII, 350 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.51 kg
Ediția:Softcover reprint of the original 1st ed. 2003
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
I Role-Based Access Control.- 1 Shielding RBAC Infrastructures from Cyberterrorism.- 2 Privilege Administration for the Role Graph Model.- 3 Implementing RBAC Policies.- 4 Role Delegation for a Resource-Based Security Model.- 5 Using X.509 Attribute Certificates for Role-Based EAM.- 6 Implementing Workflow Systems.- II Database Security.- 7 Multiphase Damage Confinement System for Databases.- 8 Analyzing Transaction Logs for Effective Damage Assessment.- 9 Deductive Database Security.- III XML Security.- 10 Towards Secure XML Federations.- 11 Secure XML Views.- 12 Distributed Cooperative Updates of XML Documents.- IV Data Mining and Inference.- 13 On Security and Privacy Risks in Association Mining Algorithms.- 14 Mining Malicious Corruption of Data with Hidden Markov Models.- 15 A Study of Inference Problems in Distributed Databases.- V Multimedia System Security.- 16 Uniform Indexing for Geospatial Data and Authorizations.- 17 Access Control of SVG Documents.- VI Network Security.- 18 On Modeling Computer Networks for Vulnerability Analysis.- 19 On-line Intrusion Protection by Detecting Attacks with Diversity.- VII Public Key Infrastructure.- 20 Recertification: A Technique to Improve Services in PKI.- 21 A Hybrid PKI Model: Application to Secure Mediation.- VIII Formal Methods and Protocols.- 22 Implementation and Verification of Programmable Security.- 23 A Process Algebraic Approach to Security Policies.- 24 Anonymous and Secure Multicast Subscription.- IX Security and Privacy.- 25 Privacy and Civil Liberties.