• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Security, Privacy, and Trust in Modern Data Management » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Security, Privacy, and Trust in Modern Data Management

ISBN-13: 9783540698609 / Angielski / Twarda / 2007 / 472 str.

Security, Privacy, and Trust in Modern Data Management  9783540698609 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &  - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Security, Privacy, and Trust in Modern Data Management

ISBN-13: 9783540698609 / Angielski / Twarda / 2007 / 472 str.

cena 645,58 zł
(netto: 614,84 VAT:  5%)

Najniższa cena z 30 dni: 616,85 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, open interconnected systems are much more vulnerable to attacks and unauthorized data access. In the context of this threat, this book provides a comprehensive guide to security and privacy and trust in data management.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Computer Science
Computers > Database Administration & Management
Computers > Information Technology
Wydawca:
SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Seria wydawnicza:
Data-Centric Systems and Applications
Język:
Angielski
ISBN-13:
9783540698609
Rok wydania:
2007
Wydanie:
2007
Numer serii:
000308056
Ilość stron:
472
Waga:
0.93 kg
Wymiary:
23.62 x 16.26 x 2.79
Oprawa:
Twarda
Wolumenów:
01
Dodatkowe informacje:
Bibliografia
Wydanie ilustrowane

Privacy and Security Issues in a Digital World.- Privacy in the Law.- Ethical Aspects of Information Security and Privacy.- Data and System Security.- Authorization and Access Control.- Role-Based Access Control.- XML Security.- Database Security.- Trust Management.- Trusted Platforms.- Strong Authentication with Physical Unclonable Functions.- Privacy Enhancing.- Privacy-Preserving Data Mining.- Statistical Database Security.- Different Search Strategies on Encrypted Data Compared.- Client-Server Trade-Offs in Secure Computation.- Federated Identity Management.- Accountable Anonymous Communication.- Digital Asset Protection.- An Introduction to Digital Rights Management Systems.- Copy Protection Systems.- Forensic Watermarking in Digital Rights Management.- Person-Based and Domain-Based Digital Rights Management.- Digital Rights Management Interoperability.- DRM for Protecting Personal Content.- Enhancing Privacy for Digital Rights Management.- Selected Topics on Privacy and Security in Ambient Intelligence.- The Persuasiveness of Ambient Intelligence.- Privacy Policies.- Security and Privacy on the Semantic Web.- Private Person Authentication in an Ambient World.- RFID and Privacy.- Malicious Software in Ubiquitous Computing.

Milan Petkovic is a senior scientist in the ISS group (Information and System Security) at the Philips Research in Eindhoven, the Netherlands. Among his research interests are information security, secure content management, privacy protection, multimedia information retrieval, and database systems.

Willem Jonker is currently department head of the Information and System Security department at Philips Research. In addition, he is a part-time full professor of computer science at Twente University. Among his research interest are secure data management, DRM, copyright protection, secure databases, distributed applications, and content management.

The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems are much more vulnerable to attacks and unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people's privacy.

In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect to security, privacy and trust. After the introductory part that offers a perspective on privacy and security issues in the modern digital world, the contributions from leading researchers are grouped into sections on data and system security, privacy-enhancing techniques, digital asset protection, and selected topics on privacy and security in ambient intelligence. Overall, the book delivers, from information on the ethical and legislative background, to chapters on the state-of-the-art technologies such as access control, identity management and digital rights management to advice on implementing fair information practices and preventing security and privacy violations.

With this broad approach, this book appeals equally to researchers and graduate students looking for an overview of this area of ever-growing importance and to professional developers who require sound theoretical grounds for the design and implementation of secure privacy-preserving ubiquitous applications.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia