Information Security Practice and Experience: 5th International Conference, Ispec 2009 Xi'an, China, April 13-15, 2009 Proceedings
ISBN: 9783642008429 / Angielski / Miękka / 410 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 5th International Conference on Information Security Practice and Expe- ence (ISPEC 2009) was held in Xi'an, China, April 13-15, 2009. The ISPEC conference series is an established forum that brings together - searchers and practitioners to provide a con?uence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors. In previous years, ISPEC has taken place in Sin- pore (2005), Hangzhou, China (2006), Hong Kong, China (2007), and Sydney, Australia (2008). For all sessions, as this one, the conference...
The 5th International Conference on Information Security Practice and Expe- ence (ISPEC 2009) was held in Xi'an, China, April 13-15, 2009. The ISPEC c...
|
|
cena:
191,40 zł |
Active and Programmable Networks: IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised Papers
ISBN: 9783642009716 / Angielski / Miękka / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the 7th International Working Conference on Active and Programmable Networks (IWAN 2005) that was held during November 21-23, 2005, in Sophia Antipolis, Cote d' Azur, France, jointly organized by Hitachi Europe and INRIA. IWAN 2005 took place against a backdrop of questions about the viability and - cessity of a conference that deals with an area perceived by many as having run its full course. The Organizing Committee, during the preparations of the conference, took these concerns seriously and reflected them in the theme of this year's event, entitled...
This volume contains the proceedings of the 7th International Working Conference on Active and Programmable Networks (IWAN 2005) that was held during ...
|
|
cena:
191,40 zł |
Transactions on Computational Science IV: Special Issue on Security in Computing
ISBN: 9783642010033 / Angielski / Miękka / 262 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from...
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as...
|
|
cena:
191,40 zł |
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
ISBN: 9780071626774 / Angielski / Miękka / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData Corporation The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking... "Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with r... |
|
cena:
307,89 zł |
Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20
ISBN: 9783642012433 / Angielski / Twarda / 444 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18-20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long...
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a...
|
|
cena:
382,84 zł |
Wired/Wireless Internet Communications: 7th International Conference, WWIC 2009, Enschede, the Netherlands, May 27-29 2009, Proceedings
ISBN: 9783642021176 / Angielski / Miękka / 158 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The seventh edition of the International Conference on Wired/Wireless Int- net Communications (WWIC) was organized by the University of Twente in May 2009. Since the ?rst event in 2002, WWIC has been established as a highly selectiveconferencefocussingonthe rapidlydeveloping?eldof wirelessnetwo- ing, and providing an international forum for the presentation and discussion of cutting-edge research in the ?eld. The WWIC 2009 call for papers attracted 39 submissions from 20 countries, which were subject to thorough review by the Technical Program Committee members and additional experts. The...
The seventh edition of the International Conference on Wired/Wireless Int- net Communications (WWIC) was organized by the University of Twente in May ...
|
|
cena:
191,40 zł |
Hacking: The Next Generation
ISBN: 9780596154578 / Angielski / Miękka / 298 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a ... |
|
cena:
173,42 zł |
Pervasive Computing
ISBN: 9783642015151 / Angielski / Miękka / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th International Conference on Pervasive Computing, Pervasive 2009, held in Nara, Japan, in May 2009. The 20 revised full papers and 7 revised short papers presented were carefully reviewed and selected from 147 initial submissions. The papers are organized in topical sections on digital displays, navigation, at home with pervasive applications, sensors, sensors, everywhere, working together, tagging and tracking, methods and tools, and the importance of context.
This book constitutes the refereed proceedings of the 7th International Conference on Pervasive Computing, Pervasive 2009, held in Nara, Japan, in May...
|
|
cena:
191,40 zł |
Network Flow Analysis
ISBN: 9781593272036 / Angielski / Miękka / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Unlike packet sniffers that require you to reproduce network problems in order to analyze them, flow analysis lets you turn back time as you analyze your network. You'll learn how to use open source software to build a flow-based network awareness system and how to use network analysis and auditing to address problems and improve network reliability. You'll also learn how to use a flow analysis system; collect flow records; view, filter, and report flows; present flow records graphically; and use flow records to proactively improve your network. Network Flow Analysis will show you... Unlike packet sniffers that require you to reproduce network problems in order to analyze them, flow analysis lets you turn back time as you analyz... |
|
cena:
230,41 zł |
Autonomic and Trusted Computing: 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009 Proceedings
ISBN: 9783642027031 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ThisvolumecontainstheproceedingsofATC2009, the6thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality. The conference was held in Brisbane, A- tralia, during July 7-9, 2009. The conference was technically co-sponsored by the IEEE and the IEEE Computer Society Technical Committee on Scalable Computing. ATC 2009 was accompanied by three workshops on a variety of research challenges within the area of autonomic and trusted computing. ATC 2009 is a successor of the First International Workshop on Trusted and Autonomic...
ThisvolumecontainstheproceedingsofATC2009, the6thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computi...
|
|
cena:
191,40 zł |
Cyber Situational Awareness: Issues and Research
ISBN: 9781441901392 / Angielski / Twarda / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the...
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future res...
|
|
cena:
382,84 zł |
Formal Aspects in Security and Trust
ISBN: 9783642014642 / Angielski / Miękka / 330 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The present volume contains the proceedings of the 5th International Workshop on Formal Aspects in Security and Trust (FAST 2008), held in Malaga, Spain, October 9-10, 2008. FAST is an event a?liated with the 13th European Sym- sium on Research in Computer Security (ESORICS 2008). FAST 2008 was held under the auspices of the IFIP WG 1.7 on Foundations of Security Analysis and Design. The 5th International Workshop on Formal Aspects in Security and Trust (FAST 2008) aimed at continuing the successful e?ort of the previous three FAST workshop editions for fostering the cooperation among...
The present volume contains the proceedings of the 5th International Workshop on Formal Aspects in Security and Trust (FAST 2008), held in Malaga, Spa...
|
|
cena:
191,40 zł |
Trust Modeling and Management in Digital Environments: From Social Concept to System Development
ISBN: 9781615206827 / Angielski / Twarda / 598 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Trust Modeling and Management in Digital Environments: From Social Concept to System Development examines how reliance is transferred from a social to a digital concept, enabling digital system users to build up confidence in their system.
Trust Modeling and Management in Digital Environments: From Social Concept to System Development examines how reliance is transferred from a social to...
|
|
cena:
1038,16 zł |
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures
ISBN: 9783642038280 / Angielski / Miękka / 339 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents tutorial lectures from three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009. Topics include cryptographic protocol analysis, identity management and electronic voting, and wireless security. This book presents tutorial lectures from three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009. Topics ... |
|
cena:
175,94 zł |
Security Informatics
ISBN: 9781441913241 / Angielski / Miękka / 206 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. ISI topics include ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, and other related... Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for... |
|
cena:
382,84 zł |
Handbook of Information and Communication Security
ISBN: 9783642041167 / Angielski / Twarda / 867 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called "Y2K" issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs)...
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it w...
|
|
cena:
2105,82 zł |
Detection of Intrusions and Malware, and Vulnerability Assessment: 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009, Proceedings
ISBN: 9783642029172 / Angielski / Miękka / 236 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 6th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Since 2004, DIMVA annually brings together leading researchers and practitioners from academia, government and industry to present and discuss novel security research. DIMVA is organized by the Special Interest Group Security-Intrusion Detection and Response (SIDAR)-of the German Inf- matics Society (GI). The DIMVA 2009 Program Committee received 44 submissions from ind- trial and academic...
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 6th GI International Conference on Detection of Intrusions an...
|
|
cena:
191,40 zł |
Information Security: 12th International Conference, Isc 2009 Pisa, Italy, September 7-9, 2009 Proceedings
ISBN: 9783642044731 / Angielski / Miękka / 524 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009. The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and... This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Ita... |
|
cena:
382,84 zł |
On the Move to Meaningful Internet Systems 2002: Coopis, Doa, and Odbase: Confederated International Conferences Coopis, Doa, and Odbase 2002 Proceedi
ISBN: 9783540001065 / Angielski / Miękka / 1372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the three confederated conferences CoopIS 2002, DOA 2002, and ODBASE 2002, held in Irvine, CA, USA, in October/November 2002. The 77 revised full papers and 10 posters presented were carefully reviewed and selected from a total of 291 submissions. The papers are organized in topical sections on interoperability, workflow, mobility, agents, peer-to-peer and ubiquitous, work process, business and transaction, infrastructure, query processing, quality issues, agents and middleware, cooperative systems, ORB enhancements, Web services,... This book constitutes the refereed proceedings of the three confederated conferences CoopIS 2002, DOA 2002, and ODBASE 2002, held in Irvine, CA, US... |
|
cena:
191,40 zł |
Computer Safety, Reliability, and Security: 28th International Conference, SAFECOMP 2009 Hamburg, Germany, September 15-18, 2009 Proceedings
ISBN: 9783642044670 / Angielski / Miękka / 341 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer-based systems have become omnipresent commodities within our - vironment. While for a large variety of these systems such as transportation systems, nuclear or chemical plants, or medical systems their relation to safety is obvious, we often do not re?ect that others are as directly related to risks concerning harm done to persons or matter as, for example, elevator control or mobile phones. At least we are not aware of the risk in our daily use of them. Safecomp as a community and a conference series has accompanied this - velopment for 30 years up to Safecomp 2009, which was the...
Computer-based systems have become omnipresent commodities within our - vironment. While for a large variety of these systems such as transportation s...
|
|
cena:
191,40 zł |