Critical Information Infrastructures: Resilience and Protection
ISBN: 9781441944191 / Angielski / Miękka / 278 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Resilience is an increasingly important concept and quality in today s world. It is particularly important in the area of Critical Infrastructures. It is crucial in the area of Critical Information Infrastructure. This is because, since the year 2000, man has been dependent on information and telecommunications systems for survival, particularly in the Organization for Economic Cooperation and Development (OECD) countries, and because all other Critical Inf- structures depend upon, to a greater or lesser extent, Critical Information 1,2 Infrastructure. Until, probably, the late 1980s it would...
Resilience is an increasingly important concept and quality in today s world. It is particularly important in the area of Critical Infrastructures. It...
|
|
cena:
382,84 zł |
Handbook of Database Security: Applications and Trends
ISBN: 9781441943057 / Angielski / Miękka / 577 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of data integrity and availability, there is an increasing interest in research and development in data privacy. This is because today s often missi- critical databases no longer contain only data used for day-to-day processing by...
Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increas...
|
|
cena:
421,13 zł |
Power Analysis Attacks: Revealing the Secrets of Smart Cards
ISBN: 9781441940391 / Angielski / Miękka / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how... Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mo... |
|
cena:
689,15 zł |
Grid Computing Security
ISBN: 9783642079436 / Angielski / Miękka / 331 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Grid computing is widely regarded as a technology of immense potential. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area.
Grid computing is widely regarded as a technology of immense potential. Together with a brief introduction into grid computing in general and underlyi...
|
|
cena:
191,40 zł |
Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings
ISBN: 9783642165757 / Angielski / Miękka / 328 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible...
Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have bec...
|
|
cena:
191,40 zł |
Open Research Problems in Network Security: Ifip Wg 11.4 International Workshop, Inetsec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Pape
ISBN: 9783642192272 / Angielski / Miękka / 171 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds.
This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in M...
|
|
cena:
191,40 zł |
Information Security Practice and Experience
ISBN: 9783642128264 / Angielski / Miękka / 397 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 6th International Conference on Information Security Practice and Expe- ence (ISPEC 2010) was held in Seoul, Korea, May 12 13, 2010. The ISPEC conference series is an established forum that brings together - searchers and practitioners to provide a con?uence of new information security technologies, including their applications and their integration with IT systems invariousverticalsectors.Inpreviousyears, ISPEChastakenplaceinSingapore (2005), Hangzhou, China (2006), Hong Kong, China (2007), Sydney, Australia (2008), andXi an, China (2009).For all sessions, as this one, the conferencep-...
The 6th International Conference on Information Security Practice and Expe- ence (ISPEC 2010) was held in Seoul, Korea, May 12 13, 2010. The ISPEC con...
|
|
cena:
191,40 zł |
Information Security Applications
ISBN: 9783642179549 / Angielski / Miękka / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010.The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.
This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island...
|
|
cena:
191,40 zł |
Data Privacy Management and Autonomous Spontaneous Security: 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010 Athens, G
ISBN: 9783642193477 / Angielski / Miękka / 259 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to...
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Ma...
|
|
cena:
191,40 zł |
Public Key Cryptography: PKC 2011
ISBN: 9783642193781 / Angielski / Miękka / 495 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011. The 28 papers presented were carefully reviewed and selected from 103 submissions. The book also contains one invited talk. The papers are grouped in topical sections on signatures, attribute based encryption, number theory, protocols, chosen-ciphertext security, encryption, zero-knowledge, and cryptanalysis.
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC ...
|
|
cena:
191,40 zł |
Formal Aspects of Security and Trust
ISBN: 9783642197505 / Angielski / Miękka / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 42 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust,...
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, h...
|
|
cena:
191,40 zł |
Pfsense 2 Cookbook
ISBN: 9781849514866 / Angielski / Miękka / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. pfSense is an open source distribution of FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options, which makes determining requirements a little more difficult and a lot more important, compared to other offerings. Through this book you will see that pfSense offers numerous alternatives to fit any environment's security needs. pfSense 2.0 Cookbook is the first and only book to explore all the features of pfSense, including those released in the latest 2.0 version. With...
pfSense is an open source distribution of FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. The versa...
|
|
cena:
237,94 zł |
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
ISBN: 9780071828369 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Master the tactics and tools of the advanced persistent threat hacker
In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples... Master the tactics and tools of the advanced persistent threat hacker
In this book, IT security expert Tyler Wrightson reveals the mindset, skills,... |
|
cena:
264,53 zł |
Security, Privacy, and Trust in Modern Data Management
ISBN: 9783642089268 / Angielski / Miękka / 472 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Advances in information and communication technologies continue to p- vide new means of conducting remote transactions. Services facilitated by these technologies are spreading increasingly into our commercial and private spheres. For many people, these services have changed the way they work, communicate, shop, arrange travel, etc. Remote transactions, however, may also open possibilities for fraud and other types of misuse. Hence, the requi- ment to authorize transactions may arise. Authorization may in turn call for some kind of user authentication. When users have to provide personal inf-...
Advances in information and communication technologies continue to p- vide new means of conducting remote transactions. Services facilitated by these ...
|
|
cena:
440,28 zł |
Backtrack 4: Assuring Security by Penetration Testing
ISBN: 9781849513944 / Angielski / Miękka / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network. BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step...
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered i...
|
|
cena:
267,08 zł |
Privacy-Respecting Intrusion Detection
ISBN: 9781441941756 / Angielski / Miękka / 307 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties in evaluating a system to determine if it provided the necessary security for particular applications. The Anderson Report, published in 1972, was the outcome of an Air Force Planning Study whose intent was to de?ne the research and development paths required to make secure computers a reality in the USAF. A major contribution of this report was the de?nition of the reference monitor concept,...
Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for...
|
|
cena:
555,15 zł |
Privacy-Preserving Data Mining: Models and Algorithms
ISBN: 9781441943712 / Angielski / Miękka / 514 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes. Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and... Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns t... |
|
cena:
765,72 zł |
New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the Ifip Tc 11 22nd International Information Security Conferen
ISBN: 9781441944337 / Angielski / Miękka / 498 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC 2007) on "New Approaches for Security, Privacy and Trust in Complex Environments" held in Sandton, South Africa from 14 to 16 May 2007. The IFIP/SEC conferences are the flagship events of TC-11. In May 1995 South Africa for the first time hosted an IFIP/SEC conference in Cape Town. Now, twelve years later, we are very pleased to have succeeded in our bid to once again present the IFIP/SEC conference in South Africa. The current IT environment deals with novel, complex approaches...
This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC 2007) on "New Approaches for Securit...
|
|
cena:
382,84 zł |
Security for Telecommunications Networks
ISBN: 9781441944382 / Angielski / Miękka / 182 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Creating a starting place for new researchers in the field of secure telecommunications networks, this volume not only discusses emerging threats, along with system vulnerability, but also presents the open questions posited by network evolution and defence mechanisms.
Creating a starting place for new researchers in the field of secure telecommunications networks, this volume not only discusses emerging threats, alo...
|
|
cena:
325,42 zł |
Trust Management: Proceedings of Ifiptm 2007: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, July 30-August
ISBN: 9781441944658 / Angielski / Miękka / 414 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Mo- ton, New Brunswick, Canada from July 29th to August 2nd, 2007. The annual iTrust international conference looks at trust from multidis- plinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology, is built on the work of the iTrust working group (http: //www.itrust.uoc.gr), and has had four highly successful conferences in Europe to date. The annual PST conference has quickly established itself as a...
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Mo- t...
|
|
cena:
382,84 zł |