Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings: Communications in Computer and Information Science, cartea 122
Editat de Wai-Chi Fang, Muhammad Khurram Khan, Kirk P. Arnett, Heau-jo Kang, Dominik Ślęzaken Limba Engleză Paperback – 22 noi 2010
Din seria Communications in Computer and Information Science
- 20% Preț: 325.48 lei
- 20% Preț: 669.06 lei
- 20% Preț: 324.64 lei
- 20% Preț: 337.85 lei
- 20% Preț: 656.19 lei
- 20% Preț: 659.97 lei
- 20% Preț: 333.88 lei
- 20% Preț: 337.52 lei
- 20% Preț: 656.36 lei
- 20% Preț: 656.69 lei
- 20% Preț: 659.31 lei
- Preț: 392.60 lei
- 20% Preț: 329.58 lei
- Preț: 386.00 lei
- 20% Preț: 336.02 lei
- 20% Preț: 334.53 lei
- 20% Preț: 331.74 lei
- 20% Preț: 655.85 lei
- 20% Preț: 338.49 lei
- 20% Preț: 333.88 lei
- 20% Preț: 338.68 lei
- 20% Preț: 666.58 lei
- 20% Preț: 307.20 lei
- 20% Preț: 336.02 lei
- 20% Preț: 338.68 lei
- 20% Preț: 330.24 lei
- 20% Preț: 660.81 lei
- 15% Preț: 648.42 lei
- 20% Preț: 653.56 lei
- 20% Preț: 332.06 lei
- 20% Preț: 337.85 lei
- 20% Preț: 1055.29 lei
- 20% Preț: 836.50 lei
- 20% Preț: 656.69 lei
- 20% Preț: 1231.01 lei
- 20% Preț: 331.25 lei
- 20% Preț: 336.02 lei
- 20% Preț: 323.00 lei
- 20% Preț: 113.94 lei
- 20% Preț: 336.21 lei
- Preț: 387.75 lei
- 20% Preț: 470.58 lei
- 20% Preț: 750.86 lei
- 20% Preț: 337.00 lei
- 20% Preț: 327.95 lei
- 20% Preț: 410.03 lei
- 20% Preț: 335.36 lei
- 20% Preț: 534.59 lei
- 20% Preț: 673.02 lei
Preț: 334.53 lei
Preț vechi: 418.16 lei
-20% Nou
Puncte Express: 502
Preț estimativ în valută:
64.03€ • 66.58$ • 53.58£
64.03€ • 66.58$ • 53.58£
Carte disponibilă
Livrare economică 21 februarie-07 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642176098
ISBN-10: 3642176097
Pagini: 316
Ilustrații: XIII, 300 p. 125 illus.
Greutate: 0.48 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642176097
Pagini: 316
Ilustrații: XIII, 300 p. 125 illus.
Greutate: 0.48 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Impact of Finger Type in Fingerprint Authentication.- Using Arabic CAPTCHA for Cyber Security.- Information Assurance in Saudi Organizations – An Empirical Study.- Emerging Biometric Modalities: Challenges and Opportunities.- On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP.- Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices – An Empirical Study of Telecommunication Industry in Pakistan.- Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON.- Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device.- Secure OSGi Platform against Service Injection.- A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse.- Probabilistic Route Selection Algorithm for IP Traceback.- An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection.- Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model.- Histogram-Based Reversible Data Hiding with Quadtree Concepts.- MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology.- Performance Analysis of Cyber Security Awareness Delivery Methods.- Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.- One-Time Password System with Infinite Nested Hash Chains.- Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence.- Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor.- Fusion of Moving and Static Facial Features for Robust Face Recognition.- Human Authentication Based on ECG Waves Using Radon Transform.- Wireless Network Security Vulnerabilities and Concerns.- FigmentAuthentication Scheme in Wireless Sensor Network.- Issues of Security and Network Load in Presence – A Survey.- Discovering the Botnet Detection Techniques.- Contactless Biometrics in Wireless Sensor Network: A Survey.- A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems.- Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010.- Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model.- Internet SCADA Utilizing API’s as Data Source.- Insecure Information System’s Solution Using Isolation Method.- Communication Security for Control Systems in Smart Grid.- NMACA Approach Used to Build a Secure Message Authentication Code.
Caracteristici
Fast-track conference proceedings State-of-the-art research Up-to-date results