Critical Information Infrastructures Security
ISBN: 9783540890959 / Angielski / Miękka / 376 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure Security (CRITIS 2007), that was held during October 3 5, 2007 in Benalmadena-Costa (Malaga), Spain, and was hosted by the University of Malaga, Computer Science Department. In response to the 2007 call for papers, 75 papers were submitted. Each paper was reviewed by three members of the Program Committee, on the basis of significance, novelty, technical quality and critical infrastructures relevance of the work reported therein. At the end of the reviewing process, only 29...
This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure Security (CRITIS 2007), that was...
|
|
cena:
191,40 zł |
Advances in Cryptology-Asiacrypt 2008
ISBN: 9783540892540 / Angielski / Miękka / 588 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 14th International Conference on the Theory and Applications of Cr- tology and Information Security-ASIACRYPT 2008-was held in Melbourne during December 7-11,2008.Theconferencewassponsoredbythe International Associationfor CryptologicResearch(IACR) in cooperationwith the Center for AdvancedComputing -CryptographyandAlgorithms(ACAC), MacquarieU- versity, Deakin University, the ResearchNetwork for a Secure Australia (RNSA) andSECIA.ASIACRYPT2008waschairedbyLynnBattenandIhadthehonor of serving as the Program Chair. There were 208 submissions from which 12 papers were withdrawn. Each paper...
The 14th International Conference on the Theory and Applications of Cr- tology and Information Security-ASIACRYPT 2008-was held in Melbourne during De...
|
|
cena:
191,40 zł |
Information Security: 11th International Conference, Isc 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings
ISBN: 9783540858843 / Angielski / Miękka / 526 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 11th Information Security Conference (ISC 2008) was held in Taipei, T- wan, September 15 18,2008. ISC is an annual international conference covering researchintheoryandapplicationsofinformationsecurity.Itwas?rstinitiatedas a workshop(ISW) in Japan in 1997.This was followed by ISW 1999 in Malaysia and ISW 2000 in Australia. ISW became ISC when it was held in Spain in 2001 (ISC2001).ThelatestconferenceswereheldinBrazil(ISC2002), UK(ISC2003), USA(ISC2004), Singapore(ISC2005), Greece(ISC2006), andChile(ISC2007). ThisyeartheeventwassponsoredbytheChineseCryptologyandInformation- curity...
The 11th Information Security Conference (ISC 2008) was held in Taipei, T- wan, September 15 18,2008. ISC is an annual international conference coveri...
|
|
cena:
191,40 zł |
Smart Card Research and Advanced Applications: 8th Ifip Wg 8.8/11.2 International Conference, Cardis 2008, London, Uk, September 8-11, 2008, Proceedin
ISBN: 9783540858928 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since1994, CARDIShasbeentheforemostinternationalconferencededicatedto smart card research and applications. Every two years, the scienti?c community congregates to present new ideas and discuss recent developments with both an academicandindustrialfocus.Followingtheincreasedcapabilitiesofsmartcards anddevices, CARDIS has becomea majoreventfor the discussionofthe various issuesrelatedtotheuseofsmallelectronictokensintheprocessofhuman-machine interactions.Thescopeoftheconferenceincludesnumeroussub?eldssuchasn- working, e?cientimplementations, physicalsecurity, biometrics, andso on. This year's...
Since1994, CARDIShasbeentheforemostinternationalconferencededicatedto smart card research and applications. Every two years, the scienti?c community c...
|
|
cena:
191,40 zł |
Ambient Intelligence: European Conference, AmI 2008, Nuremberg, Germany, November 19-22, 2008, Proceedings
ISBN: 9783540896166 / Angielski / Miękka / 380 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the Second European Ambient Intelligence (AmI) Conference. The conference took place in Erlangen and Nurnberg, November 19 22, 2008. The concept of ambient intelligence (AmI) was introduced in the late 1990s as a novel paradigm for electronic environments for the years 2010-2020. It builds on the early visions of Weiser describing a novel mobile computing infrastr- ture integrated into the networked environment of people. According to early defi- tions, AmI refers to smart electronic surroundings that are sensitive and responsive to the presence of...
This volume contains the proceedings of the Second European Ambient Intelligence (AmI) Conference. The conference took place in Erlangen and Nurnberg,...
|
|
cena:
191,40 zł |
Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008, Proceedings
ISBN: 9783540896401 / Angielski / Miękka / 412 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TheseventhinternationalconferenceonCryptologyandNetworkSecurity(CANS 2008)washeld at HKU Town Center, Hong Kong, China, during December 2-4, 2008. The conference was organized by the Department of Computer Science, theUniversityofHongKong, andwasfullysupportedbytheCenterforInfor- tion Security and Cryptography at the University of Hong Kong, the Cyberport Institute of Hong Kong at the University of Hong Kong and the Department of Computer Science at the City University of Hong Kong. The goal of CANS is to promote research on all aspects of network security, as well as to build a bridge...
TheseventhinternationalconferenceonCryptologyandNetworkSecurity(CANS 2008)washeld at HKU Town Center, Hong Kong, China, during December 2-4, 2008. The...
|
|
cena:
191,40 zł |
Progress in Cryptology - Indocrypt 2008: 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings
ISBN: 9783540897538 / Angielski / Miękka / 437 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography. This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India... |
|
cena:
191,40 zł |
Information Systems Security: 4th International Conference, Iciss 2008, Hyderabad, India, December 16-20, 2008, Proceedings
ISBN: 9783540898610 / Angielski / Miękka / 307 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 4th International Conference on Information System Security (ICISS 2007) was held December 16-20, 2008 at the Jawaharlal Nehru Technological Univ- sity (JNTU) in Hyderabad, India. Although this conference is held in India, it is a decidedly international conference, attracting papers from all around the world. This year, there were 81 submissions from 18 di?erent countries. The- nal program contained papers from Australia, Austria, France, Germany, India, Poland, UK, and USA. From the 81 submissions, the Program Committee accepted 15 full papers, 4 short papers, and 2 ongoing research...
The 4th International Conference on Information System Security (ICISS 2007) was held December 16-20, 2008 at the Jawaharlal Nehru Technological Univ-...
|
|
cena:
191,40 zł |
Critical Information Infrastructures Security: First International Workshop, Critis 2006, Samos Island, Greece, August 31 - September 1, 2006
ISBN: 9783540690832 / Angielski / Miękka / 285 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Key sectors of modern economies depend highly on ICT. The information flowing through the resulting technological super-infrastructure as well as the information being processed by the complex computing systems that underpin it becomes crucial because its disruption, disturbance or loss can lead to high financial, material and, sometimes, human loss. As a consequence, the security and dependability of this infrastructure become critical and its protection a major objective for governments, companies and the research community. CRITIS has been born as an event that aims to bring together...
Key sectors of modern economies depend highly on ICT. The information flowing through the resulting technological super-infrastructure as well as the ...
|
|
cena:
191,40 zł |
Distributed Computing and Networking: 10th International Conference, Icdcn 2009, Hyderabad, India, January 3-6, 2009, Proceedings
ISBN: 9783540922940 / Angielski / Miękka / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Distributed Computing and Networking, ICDCN 2009, held in Hyderabad, India, during January 3-6, 2009. The 20 papers and 32 short presentations presented together with 3 keynote talks and a memorial lecture on A.K. Choudhury were carefully reviewed and selected from 179 submissions. The topics addressed are sensor networks, multi-core and shared memory, peer-to-peer-computing, reliability and security, distributed computing, network algorithms, fault tolerance and models, fault tolerance and... This book constitutes the refereed proceedings of the 10th International Conference on Distributed Computing and Networking, ICDCN 2009, held in Hy... |
|
cena:
191,40 zł |
IP Operations and Management: 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008, Proceedings
ISBN: 9783540873563 / Angielski / Miękka / 178 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On behalf of the IEEE Communications Society, Technical Committee on N- work Operations and Management (CNOM), Manweek 2008 Organizing C- mittee, and members of the IPOM Technical Program Committee, it is our pleasureto present the proceedings of the 8th IEEE Workshop on IP Operations and Management(IPOM 2008), heldaspartofManweek2008duringSeptember 22-26, 2008, on Samos, Greece. ThecurrentInternetisalarge-scaledistributedsystemwhosesub-components suchasaddressing, protocols, algorithms, services, need to scalein time withthe rapid growth of Internet tra?c volumes. Moreover, there is a high...
On behalf of the IEEE Communications Society, Technical Committee on N- work Operations and Management (CNOM), Manweek 2008 Organizing C- mittee, and ...
|
|
cena:
191,40 zł |
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops: OTM Confederated International Conferences and Posters, AWeSOMe, CAMS, COMINF, IS
ISBN: 9783540482697 / Angielski / Miękka / 1064 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This two-volume set LNCS 4277/4278 constitutes the refereed proceedings of 14 international workshops held as part of OTM 2006 in Montpellier, France in October/November 2006. The 191 revised full papers presented were carefully reviewed and selected from a total of 493 submissions to the workshops. The first volume begins with 26 additional revised short or poster papers of the OTM 2006 main conferences. This two-volume set LNCS 4277/4278 constitutes the refereed proceedings of 14 international workshops held as part of OTM 2006 in Montpellier, Fran... |
|
cena:
382,84 zł |
Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008, Proceedings
ISBN: 9783540895978 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Third International Workshop on Security (IWSEC 2008) was held at Kagawa International Conference Hall, Kagawa, Japan, November 25-27, 2008. The workshop was co-sponsored jointly by CSEC, a special interest group on computer security of IPSJ (Information Processing Society of Japan) and ISEC, a technical group on information security of the IEICE (The Institute of El- tronics, Information and Communication Engineers). The excellent Local Or- nizingCommitteewasledbytheIWSEC2008GeneralCo-chairs, MasatoTerada and Kazuo Ohta. This year, there were 94 paper submissions from all over the world....
The Third International Workshop on Security (IWSEC 2008) was held at Kagawa International Conference Hall, Kagawa, Japan, November 25-27, 2008. The w...
|
|
cena:
191,40 zł |
Information Networking: Towards Ubiquitous Networking and Services
ISBN: 9783540895237 / Angielski / Miękka / 860 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the set of revised selected papers presented at the 21st International Conference on Information Networking (ICOIN 2007), which was held in Estoril, Portugal, January 23 25, 2007. The conference series started under the name of Joint Workshop on Computer Communications, in 1986. At that time, it constituted a technical meeting for researchersand engineers on - ternet technologies in East Asian countries, where several technical networking issues were discussed. In 1993, the meeting was reorganized as an international conference known as ICOIN. Recent conferences were held...
This volume contains the set of revised selected papers presented at the 21st International Conference on Information Networking (ICOIN 2007), which w...
|
|
cena:
382,84 zł |
Engineering Secure Software and Systems: First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009 Proceedings
ISBN: 9783642001987 / Angielski / Miękka / 199 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the First International Symposium on Engineering Secure Software and Systems, ESSoS 2009, held in Leuven, Belgium, in February 2009. The 10 revised full papers presented together with 7 industry reports and ideas papers were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on policy verification and enforcement, model refinement and program transformation, secure system development, attack analysis and prevention, as well as testing and assurance. This book constitutes the refereed proceedings of the First International Symposium on Engineering Secure Software and Systems, ESSoS 2009, held in... |
|
cena:
191,40 zł |
Computer Security: Protecting Digital Resources: Protecting Digital Resources
ISBN: 9780763759940 / Angielski / Miękka / 453 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Today, Society Is Faced With Numerous Internet Schemes, Fraudulent Scams, And Means Of Identity Theft That Threaten Our Safety And Our Peace Of Mind. Computer Security: Protecting Digital Resources Provides A Broad Approach To Computer-Related Crime, Electronic Commerce, Corporate Networking, And Internet Security, Topics That Have Become Increasingly Important As More And More Threats Are Made On Our Internet Environment. This Book Is Oriented Toward The Average Computer User, Business Professional, Government Worker, And Those Within The Education Community, With The Expectation That...
Today, Society Is Faced With Numerous Internet Schemes, Fraudulent Scams, And Means Of Identity Theft That Threaten Our Safety And Our Peace Of Mind. ...
|
|
cena:
1004,59 zł |
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
ISBN: 9780979958717 / Angielski / Miękka / 468 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual...
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discov...
|
|
cena:
216,60 zł |
Computer Security: Intrusion, Detection & Prevention
ISBN: 9781606927816 / Angielski / Twarda / 202 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy. Computer security provides a technical strategy to convert negative requirements to positive enforceable rules. This book presents the research in this field.
The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as ...
|
|
cena:
897,30 zł |
Trusted Computing: Second International Conference, Trust 2009 Oxford, Uk, April 6-8, 2009, Proceedings
ISBN: 9783642005862 / Angielski / Miękka / 265 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Thisvolumecontainsthe15paperspresentedinthetechnicalstrandoftheTrust 2009 conference, held in Oxford, UK in April 2009. Trust 2009 was the second international conference devoted to the technical and socio-economic aspects of trusted computing. The conference had two main strands, one devoted to technical aspects of trusted computing (addressed by these proceedings), and the other devoted to socio-economic aspects. Trust 2009 built on the successful Trust 2008 conference, held in Villach, Austria in March 2008. The proceedings of Trust 2008, containing 14 papers, were published in volume 4968...
Thisvolumecontainsthe15paperspresentedinthetechnicalstrandoftheTrust 2009 conference, held in Oxford, UK in April 2009. Trust 2009 was the second inte...
|
|
cena:
191,40 zł |
Trust Management for Service-Oriented Environments
ISBN: 9781441903099 / Angielski / Twarda / 135 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability, science and health-care from the physical world to the virtual world. The result of this on-going migration is a new place very much different from the physical world, one where interconnected services interact with human users, sensors and embedded devices. Yet for this vision to become reality, trust needs to be addressed as members of the global e-society r- ularly today deal with the question whether they can trust other, unknown parties. Trust is a vital component of...
Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability, science and health-care fro...
|
|
cena:
382,84 zł |