wyszukanych pozycji: 11
Database Security X: Status and Prospects
ISBN: 9780412808203 / Angielski / Twarda / 1997 / 313 str. Termin realizacji zamówienia: ok. 20 dni roboczych. The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their knowledge. The book brings together contributions from experts in the field throughout the world. Database security is still a key topic in mist businesses and in the public sector, having implications for the whole of society.
The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their k...
|
|
cena:
583,65 zł |
Data and Applications Security and Privacy XXIX: 29th Annual Ifip Wg 11.3 Working Conference, Dbsec 2015, Fairfax, Va, Usa, July 13-15, 2015, Proceedi
ISBN: 9783319208091 / Angielski / Miękka / 2015 / 364 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the refereed proceedings of the 29th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2015, held in Fairfax, VA, USA, in July 2015. The 18 revised full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: data anonymization and computation; access control and authorization; user privacy; authentication and information integration; privacy and trust; access control and usage policies; network and internet security;...
This book constitutes the refereed proceedings of the 29th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and ...
|
|
cena:
194,52 zł |
Information Security: 12th International Conference, Isc 2009 Pisa, Italy, September 7-9, 2009 Proceedings
ISBN: 9783642044731 / Angielski / Miękka / 2009 / 524 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009. The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and... This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Ita... |
|
cena:
389,09 zł |
From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday
ISBN: 9783030048334 / Angielski / Miękka / 2018 / 487 str. Termin realizacji zamówienia: ok. 20 dni roboczych. |
|
cena:
194,52 zł |
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP
ISBN: 9783642123672 / Angielski / Miękka / 2010 / 386 str. Termin realizacji zamówienia: ok. 20 dni roboczych. These proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held during April 12-14, 2010 in Passau, Germany. In response to the call for papers, 69 papers were submitted to the wo- shop. These papers were evaluated on the basis of their signi?cance, novelty, and technicalquality. Eachpaper was reviewedby four members of the Program Committee. Reviewing was double-blind meaning that the Program Committee was not able to see the names and a?liations of the authors, and the authors were not told which committee...
These proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held duri...
|
|
cena:
194,52 zł |
Public Key Infrastructure: 4th European Pki Workshop: Theory and Practice, Europki 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings
ISBN: 9783540734079 / Angielski / Miękka / 2007 / 394 str. Termin realizacji zamówienia: ok. 20 dni roboczych. These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held in Palma de Mallorca, Spain, during June 28 30, and hosted by the Computer Science Department of the University of Balearic Islands (UIB) with the support of the Balearic Islands Government and the Private Law Department at UIB. This year s event was the fourth event in the EuroPKI Workshops series. Previous events of the series were held in: Samos, Greece (2004); Kent, UK (2005); and Turin, Italy, (2006). In response to the call for papers, 77 papers were submitted to...
These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held in Palma de Mallorca, Spain,...
|
|
cena:
194,52 zł |
Secure Cloud Computing
ISBN: 9781493948833 / Angielski / Miękka / 2016 / 343 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book presents a range of cloud computing security challenges and promising solution paths. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms.
This book presents a range of cloud computing security challenges and promising solution paths. In Chapter 2, Chen and Sion present a dollar cost mode...
|
|
cena:
428,00 zł |
Secure Cloud Computing
ISBN: 9781461492771 / Angielski / Twarda / 2014 / 343 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters...
This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical consideratio...
|
|
cena:
389,09 zł |
Privacy in Location-Based Applications: Research Issues and Emerging Trends
ISBN: 9783642035104 / Angielski / Miękka / 2009 / 217 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Location-based applications refer to those that use location data in a prominent manner. Location data can be very effective for service provisioning, enabling the birth of a new generation of information services. Although data security and privacy issues have been extensively investigated in several domains, current techniques are not readily applicable to location-based applications. Conciliating the effectiveness of these applications with privacy concerns constitutes a unique challenge, mostly due to the semantic richness of location and time information. Research in this field... Location-based applications refer to those that use location data in a prominent manner. Location data can be very effective for service provisioni... |
|
cena:
194,52 zł |
Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
ISBN: 9783642380037 / Angielski / Miękka / 2013 / 321 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012...
|
|
cena:
194,52 zł |
Computer Security - ESORICS 2004: 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings
ISBN: 9783540229872 / Angielski / Miękka / 2004 / 457 str. Termin realizacji zamówienia: ok. 20 dni roboczych. ForewordfromtheProgramChairs These proceedings contain the papers selected for presentation at the 9th - ropean Symposium on Research in Computer Security (ESORICS), held during September 13 15, 2004 in Sophia Antipolis, France. In response to the call for papers 159 papers were submitted to the conference. These papers were evaluated on the basis of their signi?cance, novelty, and te- nicalquality. Eachpaper wasreviewedby at leastthree members of the program committee. The program committee meeting was held electronically; there was an intensive discussion over a period of two weeks. Of the...
ForewordfromtheProgramChairs These proceedings contain the papers selected for presentation at the 9th - ropean Symposium on Research in Computer Secu...
|
|
cena:
194,52 zł |