Privacy Enhancing Technologies: 10th International Symposium, Pets 2010, July 21-23, 2010, Berlin, Germany, Proceedings
ISBN: 9783642145261 / Angielski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in July 2010. This book features the papers handling topics such as access control, privacy of web based search, anonymus webs of trust, security attacks, active timing attacks in lo-latency anonymus communication, and more.
Constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in July 2010. This book features the pape...
|
|
cena:
191,40 zł |
It Security Management: It Securiteers - Setting Up an It Security Function
ISBN: 9789048188819 / Angielski / Twarda / 247 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company.... IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international stan... |
|
cena:
382,84 zł |
Preserving Privacy in Data Outsourcing
ISBN: 9781441976581 / Angielski / Twarda / 198 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Foreword by Pierangela Samarati Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release. Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are... Foreword by Pierangela Samarati Privacy requirements have an increasing impact on the realization of modern applications. Commercial and leg... |
|
cena:
382,84 zł |
Securing Strats in Linux Platforms and Applications
ISBN: 9780763791896 / Angielski / Miękka / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Strategies In Linux Platforms And Applications Covers Every Major Aspect Of Security On A Linux System. Written By An Industry Expert, This Book Is Divided Into Three Natural Parts To Illustrate Key Concepts In The Field. It Opens With A Discussion On The Risks, Threats, And Vulnerabilities Associated With Linux As An Operating System Using Examples From Red Hat Enterprise Linux And Ubuntu. Part 2 Discusses How To Take Advantage Of The Layers Of Security Available To Linux--User And Group...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Strategies In Linux Platforms And Applications Cov...
|
|
cena:
613,11 zł |
Advances in Systems Safety: Proceedings of the Nineteenth Safety-Critical Systems Symposium, Southampton, Uk, 8-10th February 2011
ISBN: 9780857291325 / Angielski / Miękka / 315 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Advances in Systems Safety contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK, in February 2011.
The Symposium is for engineers, managers and academics in the field of system safety, across all industry sectors, so the papers making up this volume offer a wide-ranging coverage of current safety topics, and a blend of academic research and industrial experience. They include both recent developments in the field and discussion of open issues that will shape future progress. The 17 papers in this volume are presented... Advances in Systems Safety contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK, in Febru...
|
|
cena:
574,29 zł |
Stabilization, Safety, and Security of Distributed Systems: 12th International Symposium, SSS 2010, New York, Ny, Usa, September 20-22, 2010, Proceedi
ISBN: 9783642160226 / Angielski / Miękka / 614 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The papers in this volume were presented at the 12th International Sym- sium on Stabilization, Safety, and Security of Distributed Systems (SSS), held September 20 22, 2010 at Columbia University, NYC, USA. The SSS symposium is an international forum for researchersand practiti- ers in the design and development of distributed systems with self-* properties: (theclassical)self-stabilizing, self-con?guring, self-organizing, self-managing, se- repairing, self-healing, self-optimizing, self-adaptive, andself-protecting. Research in distributed systems is now at a crucial point in its evolution,...
The papers in this volume were presented at the 12th International Sym- sium on Stabilization, Safety, and Security of Distributed Systems (SSS), held...
|
|
cena:
382,84 zł |
Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009, Revised Selected Papers
ISBN: 9783642163418 / Angielski / Miękka / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information SecurityandbytheChineseAssociationforCryptologicResearchincooperation with the International Association for Cryptologic Research (IACR). The c- ference was held in Beijing, China, in the middle of December, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. The conference is a leading annual international event in the area of...
The5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information Secur...
|
|
cena:
191,40 zł |
Wireless Network Security
ISBN: 9781441939197 / Angielski / Miękka / 424 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking. This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireles... |
|
cena:
574,29 zł |
Fundamentals of Computer Security
ISBN: 9783642077135 / Angielski / Miękka / 677 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system....
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer securi...
|
|
cena:
218,20 zł |
Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selec
ISBN: 9783642168215 / Angielski / Miękka / 271 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2010, held in Istanbul, Turkey, in June 2010. The 17 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 47 submissions. The papers focus on approaches to solve security and data-protection issues in advancedcontactless technologies like RFID. Topics addressed are new applications for secure RFID systems, data protection and privacy-enhancing techniques for RFID, cryptographic protocols for RFID,...
This book constitutes the refereed proceedings of the 6th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec ...
|
|
cena:
191,40 zł |
Progress in Cryptology - INDOCRYPT 2010: 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings
ISBN: 9783642174001 / Angielski / Miękka / 366 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th International Conference on Cryptology in India, INDOCRYPT 2010, held in Hyderabad, India, in December 2010.The 22 revised full papers were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on security of RSA and multivariate schemes; security analysis, pseudorandom permutations and applications; hash functions; attacks on block ciphers and stream ciphers; fast cryptographic computation; cryptanalysis of AES; and efficient implementation.
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology in India, INDOCRYPT 2010, held in Hyderabad, India, ...
|
|
cena:
191,40 zł |
Distributed Computing and Networking
ISBN: 9783642176784 / Angielski / Miękka / 420 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Distributed Computing and Networking, ICDCN 2011, held in Bangalore, India, during January 2-5, 2011.The 31 revised full papers and 3 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 140 submissions. The papers address all current issues in the field of distributed computing and networking. Being a leading forum for researchers and practitioners to exchange ideas and share best practices, ICDCN also serves as a forum for PhD students to share their...
This book constitutes the refereed proceedings of the 12th International Conference on Distributed Computing and Networking, ICDCN 2011, held in Banga...
|
|
cena:
191,40 zł |
Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010
ISBN: 9783642177132 / Angielski / Miękka / 261 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. 2.1 Web Application Vulnerabilities Many web application vulnerabilities havebeenwell documented andthemi- gation methods havealso beenintroduced 1]. The most common cause ofthose vulnerabilities isthe insu?cient input validation. Any data originated from o- side of the program code, forexample input data provided by user through a web form, shouldalwaysbeconsidered malicious andmustbesanitized before use.SQLInjection, Remote code execution orCross-site Scriptingarethe very common vulnerabilities ofthattype 3]. Below isabrief introduction toSQL- jection vulnerability though the security...
2.1 Web Application Vulnerabilities Many web application vulnerabilities havebeenwell documented andthemi- gation methods havealso beenintroduced 1]....
|
|
cena:
191,40 zł |
Information Security: 13th International Conference, Isc 2010, Boca Raton, Fl, Usa, October 25-28, 2010, Revised Selected Papers
ISBN: 9783642181771 / Angielski / Miękka / 446 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in October 2010.The 25 revised full papers and the 11 short papers presented were carefully reviewed and selected from 117 submissions. The papers are organized in topical sections on attacks and analysis; analysis; authentication, PIR and content identification; privacy; malware, crimeware and code injection; intrusion detection; side channels; cryptography; smartphones; biometrics; cryptography, application; buffer overflow; and cryptography,...
This book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in...
|
|
cena:
191,40 zł |
Network Security, Administration and Management: Advancing Technology and Practice
ISBN: 9781609607777 / Angielski / Twarda / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network Security, Administration and Management: Advancing Technologies and Practices identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems. This book is a collection of current research and practices in network security and administration to be used as a reference by practitioners as well as a text by academicians and trainers.
Network Security, Administration and Management: Advancing Technologies and Practices identifies the latest technological solutions, practices and pri...
|
|
cena:
1124,68 zł |
Advances in Information and Computer Security: 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings
ISBN: 9783642168246 / Angielski / Miękka / 371 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Fifth International Workshop on Security (IWSEC 2010) was held at Kobe InternationalConferenceCenter, Kobe, Japan, November22-24,2010. Thewo- shop was co-organized by CSEC, a special interest group concerned with the computer security of the Information Processing Society of Japan (IPSJ) and ISEC, atechnicalgroupconcernedwiththe informationsecurityofTheInstitute of Electronics, Information and Communication Engineers (IEICE). The exc- lentLocalOrganizingCommitteewasledbytheIWSEC2010GeneralCo-chairs, Hiroaki Kikuchi and Toru Fujiwara. This year IWSEC 2010 had three tracks, the Foundations...
The Fifth International Workshop on Security (IWSEC 2010) was held at Kobe InternationalConferenceCenter, Kobe, Japan, November22-24,2010. Thewo- shop...
|
|
cena:
191,40 zł |
Public Key Infrastructures, Services and Applications: 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Paper
ISBN: 9783642164408 / Angielski / Miękka / 303 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2009, held in Pisa, Italy, in September 2009.
Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 20...
|
|
cena:
191,40 zł |
Machine Learning in Cyber Trust: Security, Privacy, and Reliability
ISBN: 9781441946980 / Angielski / Miękka / 362 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms. This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover... Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose priva... |
|
cena:
593,43 zł |
Secure Multi-Party Non-Repudiation Protocols and Applications
ISBN: 9781441945396 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level... The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professio... |
|
cena:
382,84 zł |
Fifth World Conference on Information Security Education: Proceedings of the Ifip Tc 11 Wg 11.8, Wise 5, 19 to 21 June 2007, United States Military Ac
ISBN: 9781441944580 / Angielski / Miękka / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings... International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of inform... |
|
cena:
191,40 zł |