Vulnerability Analysis and Defense for the Internet
ISBN: 9781441944986 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Although these attacks are not new and are well known, the number of vulnerabilities disclosed to the public jumped nearly 5 percent during the first six months of 2007. This accounts to be the fourth year report, which shows the raise in...
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerabilit...
|
|
cena:
382,84 zł |
Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 - 26, 20
ISBN: 9781441946720 / Angielski / Miękka / 363 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation 2]. For example, Amazon. com is a good example of the success of - commender systems 1]. Over...
The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acq...
|
|
cena:
382,84 zł |
Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings
ISBN: 9783642210303 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols. This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held i...
|
|
cena:
191,40 zł |
Finding Services for an Open Architecture: A Review of Existing Applications and Programs in PEO C4I
ISBN: 9780833051660 / Angielski / Miękka / 44 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The U.S. Navy is moving away from its current stovepiped network system toward one that is service-based and in line with the concept of an open architecture. This report investigates the potential software services within the Program Executive Office, Command, Control, Communications, Computers, and Intelligence that could be used as part of a service-oriented architecture.
The U.S. Navy is moving away from its current stovepiped network system toward one that is service-based and in line with the concept of an open archi...
|
|
cena:
83,63 zł |
Transactions on Data Hiding and Multimedia Security VI
ISBN: 9783642245558 / Angielski / Miękka / 110 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applica...
|
|
cena:
191,40 zł |
The Future of Identity in the Information Society: 4th Ifip Wg 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September
ISBN: 9783642242311 / Angielski / Miękka / 283 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the...
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The in...
|
|
cena:
382,84 zł |
Open Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers
ISBN: 9783642275845 / Angielski / Miękka / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, in June 2011, co-located and under the auspices of IFIP SEC 2011, the 26th IFIP TC-11 International Information Security Conference. The 12 revised full papers were carefully reviewed and selected from 28 initial submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on assisting users, malware detection,...
This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Secur...
|
|
cena:
191,40 zł |
Situational Awareness in Computer Network Defense: Principles, Methods and Applications
ISBN: 9781466601048 / Angielski / Twarda / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security Information and Event Management (SIEM) to monitor networks in conjunction with Computer Security Incident Response Teams (CSIRT) that are responsible for ensuring availability, integrity, and confidentiality of network services. Situational Awareness in Computer Network Defense: Principles, Methods and Applications provides academia and...
Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous...
|
|
cena:
1124,68 zł |
Optimizing Information Security and Advancing Privacy Assurance: New Technologies
ISBN: 9781466600263 / Angielski / Twarda / 340 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems are discussed in this multidisciplinary collection of research, with the primary...
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amoun...
|
|
cena:
1124,68 zł |
Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
ISBN: 9781449318741 / Angielski / Miękka / 358 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your... If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS app... |
|
cena:
206,37 zł |
Fundamentals of Communications and Networking
ISBN: 9781449649173 / Angielski / Miękka / 488 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Networks Have Long Been Regarded As Methods To Connect Resources. While This Is Still That Case, Today'S Networks Are Required To Support An Increasing Array Of Real-Time Communication Methods. Video Chat, Real-Time Messaging, And Always-Connected Resources Put Demands On Networks That Were Previously Unimagined. Fundamentals Of Communications And Networking Helps Readers Understand Today'S Networks And The Way They Support The Evolving Requirements Of Different Types Of Organizations. It Covers The Critical Issues Of Designing A Network That Will Meet An Organization'S Performance Needs And...
Networks Have Long Been Regarded As Methods To Connect Resources. While This Is Still That Case, Today'S Networks Are Required To Support An Increasin...
|
|
cena:
613,11 zł |
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions
ISBN: 9781466601970 / Angielski / Twarda / 492 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape. Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the...
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering co...
|
|
cena:
1124,68 zł |
Trusted Systems: Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers
ISBN: 9783642252822 / Angielski / Miękka / 378 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010. This book features papers that are organized in seven topical sections on implementation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.
Constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010. This book features papers th...
|
|
cena:
191,40 zł |
Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Pa
ISBN: 9783642288784 / Angielski / Miękka / 319 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based...
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Ma...
|
|
cena:
191,40 zł |
Cyber Situational Awareness: Issues and Research
ISBN: 9781461424758 / Angielski / Miękka / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the...
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future res...
|
|
cena:
382,84 zł |
Network Intrusion Detection and Prevention: Concepts and Techniques
ISBN: 9781461424741 / Angielski / Miękka / 216 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones. ...Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theore... |
|
cena:
535,99 zł |
Privacy Solutions and Security Frameworks in Information Protection
ISBN: 9781466620506 / Angielski / Twarda / 308 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional...
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of t...
|
|
cena:
1124,68 zł |
The Little Black Book of Computer Security, Second Edition
ISBN: 9781475286243 / Angielski / Miękka / 212 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains checklists covering all aspects of computer security from network security, to writing security policies, and application security. It also covers the soft skills of security, such as social engineering and best practices for hiring employees and working with auditors.
This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains ...
|
|
cena:
68,07 zł |
Penetration Testing: Protecting Networks and Systems
ISBN: 9781849283717 / Angielski / Miękka / 211 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences,...
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system...
|
|
cena:
182,09 zł |
Wireshark Certified Network Analyst Exam Prep Guide (Second Edition)
ISBN: 9781893939905 / Angielski / Miękka / 186 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the Wireshark Certified Network Analyst Exam. This Official Exam Prep Guide offers a companion to Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide (Second Edition)."
This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the Wireshark Certified Network Analyst ...
|
|
cena:
248,84 zł |