Trusted Information: The New Decade Challenge: IFIP Advances in Information and Communication Technology, cartea 65
Editat de Michel Dupuy, Pierre Paradinasen Limba Engleză Hardback – 31 mai 2001
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 1191.36 lei 6-8 săpt. | |
Springer Us – 23 mar 2013 | 1191.36 lei 6-8 săpt. | |
Hardback (1) | 1197.65 lei 6-8 săpt. | |
Springer Us – 31 mai 2001 | 1197.65 lei 6-8 săpt. |
Din seria IFIP Advances in Information and Communication Technology
- 20% Preț: 170.50 lei
- 20% Preț: 615.73 lei
- 20% Preț: 330.61 lei
- Preț: 386.07 lei
- 20% Preț: 326.45 lei
- 20% Preț: 331.24 lei
- 20% Preț: 503.40 lei
- 17% Preț: 523.39 lei
- 20% Preț: 502.05 lei
- 17% Preț: 488.95 lei
- 20% Preț: 501.04 lei
- 20% Preț: 403.19 lei
- 20% Preț: 1162.10 lei
- 20% Preț: 1251.24 lei
- 18% Preț: 1191.97 lei
- 20% Preț: 1245.17 lei
- 18% Preț: 1189.03 lei
- 18% Preț: 925.68 lei
- 18% Preț: 925.85 lei
- 18% Preț: 917.87 lei
- 18% Preț: 921.07 lei
- 15% Preț: 626.99 lei
- 18% Preț: 932.56 lei
- 20% Preț: 1251.10 lei
- 20% Preț: 970.01 lei
- 18% Preț: 921.99 lei
- 20% Preț: 1246.94 lei
- 20% Preț: 967.31 lei
- 15% Preț: 627.29 lei
- 20% Preț: 1240.04 lei
- 20% Preț: 1867.66 lei
- 20% Preț: 1249.02 lei
- 18% Preț: 929.23 lei
- 18% Preț: 919.56 lei
- 18% Preț: 1189.20 lei
- 20% Preț: 1241.17 lei
- 18% Preț: 925.68 lei
- 18% Preț: 920.77 lei
- 20% Preț: 1255.40 lei
- 18% Preț: 928.76 lei
- 20% Preț: 627.29 lei
- 18% Preț: 1199.77 lei
- 20% Preț: 1247.57 lei
- 18% Preț: 1195.65 lei
- 20% Preț: 964.59 lei
- 20% Preț: 1251.92 lei
- 20% Preț: 958.83 lei
- 18% Preț: 1780.60 lei
- 20% Preț: 1255.09 lei
Preț: 1197.65 lei
Preț vechi: 1460.55 lei
-18% Nou
Puncte Express: 1796
Preț estimativ în valută:
229.23€ • 238.91$ • 190.82£
229.23€ • 238.91$ • 190.82£
Carte tipărită la comandă
Livrare economică 04-18 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780792373896
ISBN-10: 0792373898
Pagini: 508
Ilustrații: XVIII, 490 p.
Dimensiuni: 156 x 234 x 33 mm
Greutate: 0.89 kg
Ediția:2001
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
ISBN-10: 0792373898
Pagini: 508
Ilustrații: XVIII, 490 p.
Dimensiuni: 156 x 234 x 33 mm
Greutate: 0.89 kg
Ediția:2001
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
eSociety.- PyTHIA: Towards Anonymity in Authentication.- Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?.- Internet Anonymity: Problems and Solutions.- TTP Management and PKI.- Reducing Certificate Revocation Cost using NPKI.- The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems.- Smart Card.- Is the Performance of Smart Card Crytographic Functions the Real Bottleneck?.- Modelling Audit Security for Smart-Card Payment Schemes with UML-Sec.- Security Protocols.- Strong Forward Security.- Secret Sharing and Visual Cryptography Schemes.- A Two-level Time-Stamping System.- Security Analysis of the Cliques Protocols Suites: First Results.- Secure Workflow Environment.- A Secure Workflow System for Dynamic Collaboration.- On Securely Scheduling a Meeting.- Modeling and Analyzing Separation of Duties in Workflow Environments.- Secure Group Communications.- Group Security Association (GSA) Management in IP Multicast.- Communication-Efficient Group Key Agreement.- Security Policies.- Going Beyond MAC and DAC Using Mobile Policies.- An Access Control Model for Data Archives.- Risk Management.- Checklist-Based Risk Analysis with Evidential Reasoning.- Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis.- The Security Model to Combine the Corporate and Information Security.- Design Criteria to Classified Information Systems Numerically.- Network Security and Intrusion Detection.- Deception: A Tool and Curse for Security Management.- A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection.- ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection.- Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.- Trusted Platforms.- An Efficient Software Protection Scheme.- Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs.- Trusted System Design and Management.- Security Concerns for Contemporary Development Practices.- A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS.- Redefining Information Systems Security: Viable Information Systems.- Extended Description Techniques for Security Engineering.