Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22–27 August 2004 Toulouse, France: IFIP Advances in Information and Communication Technology, cartea 147
Editat de Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wangen Limba Engleză Paperback – 27 apr 2013
Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.
Din seria IFIP Advances in Information and Communication Technology
- 20% Preț: 170.51 lei
- 20% Preț: 615.74 lei
- 20% Preț: 340.32 lei
- Preț: 397.38 lei
- 20% Preț: 336.02 lei
- 20% Preț: 340.98 lei
- 20% Preț: 503.41 lei
- 17% Preț: 523.40 lei
- 20% Preț: 502.06 lei
- 17% Preț: 488.96 lei
- 20% Preț: 501.04 lei
- 20% Preț: 403.20 lei
- 15% Preț: 708.83 lei
- 20% Preț: 1162.12 lei
- 20% Preț: 1288.25 lei
- 18% Preț: 1227.21 lei
- 20% Preț: 1282.00 lei
- 18% Preț: 1224.18 lei
- 18% Preț: 953.03 lei
- 18% Preț: 953.20 lei
- 18% Preț: 944.99 lei
- 18% Preț: 948.29 lei
- 15% Preț: 645.47 lei
- 18% Preț: 960.13 lei
- 20% Preț: 1288.11 lei
- 20% Preț: 998.70 lei
- 18% Preț: 949.23 lei
- 20% Preț: 1283.81 lei
- 20% Preț: 995.89 lei
- 15% Preț: 645.79 lei
- 20% Preț: 1276.74 lei
- 20% Preț: 1922.99 lei
- 20% Preț: 1285.97 lei
- 18% Preț: 956.69 lei
- 18% Preț: 946.72 lei
- 18% Preț: 1224.36 lei
- 20% Preț: 1277.89 lei
- 18% Preț: 953.03 lei
- 18% Preț: 947.98 lei
- 20% Preț: 1292.54 lei
- 18% Preț: 956.18 lei
- 20% Preț: 645.79 lei
- 18% Preț: 1235.25 lei
- 20% Preț: 1284.47 lei
- 18% Preț: 1231.01 lei
- 20% Preț: 993.09 lei
- 20% Preț: 1288.94 lei
- 20% Preț: 987.17 lei
- 18% Preț: 1833.33 lei
Preț: 403.53 lei
Nou
Puncte Express: 605
Preț estimativ în valută:
77.22€ • 80.52$ • 64.18£
77.22€ • 80.52$ • 64.18£
Carte tipărită la comandă
Livrare economică 20 martie-03 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781475780161
ISBN-10: 1475780168
Pagini: 564
Ilustrații: XIV, 548 p.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.78 kg
Ediția:Softcover reprint of the original 1st ed. 2004
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
ISBN-10: 1475780168
Pagini: 564
Ilustrații: XIV, 548 p.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.78 kg
Ediția:Softcover reprint of the original 1st ed. 2004
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
An Abstract Reduction Model for Computer Security Risk.- Remediation Graphs for Security Patch Management.- Security Modelling for Risk Analysis.- Contrasting Malicious Applets by Modifying the Java Virtual Machine.- Analyzing Network Management Effects with Spin and cTLA.- Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics.- Meeting the Global Challenges of Security Incident Response.- Security in Globally Distributed Industrial Information Systems.- A Case for Information Ownership in ERP Systems.- Interactive Access Control for Web Services.- Identity-Based Key Infrastructures (IKI).- Modint: A Compact Modular Arithmetic Java Class Library for Cellular Phones, and its Application to Secure Electronic Voting.- Dependable Security by Twisted Secret Sharing.- A Language Driven Intrusion Detection System for Event and Alert Correlation.- Install-Time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks.- Eigenconnections to Intrusion Detection.- Visualising Intrusions: Watching the Webserver.- A Long-Term Trial of Keystroke Profiling Using Digraph, Trigraph and Keyword Latencies.- Trusted Computing, Trusted Third Parties, and Verified Communications.- Maille Authentication.- Supporting end-to-end Security Across Proxies with Multiple-Channel SSL.- A Content-Protection Scheme for Multi-Layered Reselling Structures.- An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.- IPsec Clustering.- Improving Secure Device Insertion in Home Ad Hoc Networks.- Spam Filter Analysis.- Collective Signature for Efficient Authentication of XML Documents.- Updating Encrypted XML Documents on Untrusted Machines.- Efficient Simultaneous Contract Signing.- DHCP Authentication Using Certificates.- Recursive Sandboxes: Extending Systrace to Empower Applications.- Fast Digital Certificate Revocation.- Masks: Managing Anonymity while Sharing Knowledge to Servers.- Security and Differentiated Hotspot Services Through Policy-based Management Architecture.- Key Management for Secure Multicast in Hybrid Satellite Networks.