Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings: Communications in Computer and Information Science, cartea 122
Editat de Wai-Chi Fang, Muhammad Khurram Khan, Kirk P. Arnett, Heau-jo Kang, Dominik Ślęzaken Limba Engleză Paperback – 22 noi 2010
Din seria Communications in Computer and Information Science
- 20% Preț: 318.93 lei
- 20% Preț: 655.52 lei
- 20% Preț: 318.12 lei
- 20% Preț: 331.04 lei
- 20% Preț: 642.92 lei
- 20% Preț: 646.61 lei
- 20% Preț: 327.16 lei
- 20% Preț: 330.73 lei
- 20% Preț: 643.08 lei
- 20% Preț: 643.42 lei
- 20% Preț: 645.97 lei
- Preț: 384.70 lei
- 20% Preț: 322.96 lei
- Preț: 378.26 lei
- 20% Preț: 329.26 lei
- 20% Preț: 327.80 lei
- 20% Preț: 325.06 lei
- 20% Preț: 642.59 lei
- 20% Preț: 331.68 lei
- 20% Preț: 327.16 lei
- 20% Preț: 331.86 lei
- 20% Preț: 653.10 lei
- 20% Preț: 307.20 lei
- 20% Preț: 329.26 lei
- 20% Preț: 331.86 lei
- 20% Preț: 323.59 lei
- 20% Preț: 647.43 lei
- 15% Preț: 635.31 lei
- 20% Preț: 640.35 lei
- 20% Preț: 325.38 lei
- 20% Preț: 331.04 lei
- 20% Preț: 1033.89 lei
- 20% Preț: 819.57 lei
- 20% Preț: 643.42 lei
- 20% Preț: 1206.03 lei
- 20% Preț: 324.60 lei
- 20% Preț: 329.26 lei
- 20% Preț: 316.51 lei
- 20% Preț: 113.94 lei
- 20% Preț: 329.44 lei
- Preț: 379.96 lei
- 20% Preț: 470.58 lei
- 20% Preț: 735.66 lei
- 20% Preț: 330.23 lei
- 20% Preț: 321.35 lei
- 20% Preț: 401.75 lei
- 20% Preț: 328.63 lei
- 20% Preț: 523.80 lei
- 20% Preț: 659.40 lei
Preț: 327.80 lei
Preț vechi: 409.75 lei
-20% Nou
Puncte Express: 492
Preț estimativ în valută:
62.73€ • 65.16$ • 52.11£
62.73€ • 65.16$ • 52.11£
Carte disponibilă
Livrare economică 11-25 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642176098
ISBN-10: 3642176097
Pagini: 316
Ilustrații: XIII, 300 p. 125 illus.
Greutate: 0.48 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642176097
Pagini: 316
Ilustrații: XIII, 300 p. 125 illus.
Greutate: 0.48 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Impact of Finger Type in Fingerprint Authentication.- Using Arabic CAPTCHA for Cyber Security.- Information Assurance in Saudi Organizations – An Empirical Study.- Emerging Biometric Modalities: Challenges and Opportunities.- On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP.- Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices – An Empirical Study of Telecommunication Industry in Pakistan.- Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON.- Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device.- Secure OSGi Platform against Service Injection.- A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse.- Probabilistic Route Selection Algorithm for IP Traceback.- An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection.- Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model.- Histogram-Based Reversible Data Hiding with Quadtree Concepts.- MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology.- Performance Analysis of Cyber Security Awareness Delivery Methods.- Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.- One-Time Password System with Infinite Nested Hash Chains.- Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence.- Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor.- Fusion of Moving and Static Facial Features for Robust Face Recognition.- Human Authentication Based on ECG Waves Using Radon Transform.- Wireless Network Security Vulnerabilities and Concerns.- FigmentAuthentication Scheme in Wireless Sensor Network.- Issues of Security and Network Load in Presence – A Survey.- Discovering the Botnet Detection Techniques.- Contactless Biometrics in Wireless Sensor Network: A Survey.- A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems.- Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010.- Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model.- Internet SCADA Utilizing API’s as Data Source.- Insecure Information System’s Solution Using Isolation Method.- Communication Security for Control Systems in Smart Grid.- NMACA Approach Used to Build a Secure Message Authentication Code.
Caracteristici
Fast-track conference proceedings State-of-the-art research Up-to-date results