![]() |
Secure Systems Development with UML
ISBN: 9783540007012 / Angielski / Twarda / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness. Jurjens presents the UML extension UMLsec for secure systems development. It uses the standard UML extension mechanisms, and can be employed to evaluate UML specifications for vulnerabilities using a formal semantics of a simplified fragment of UML. Established rules of security engineering can be encapsulated and hence made available even to... Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is diffi... |
cena:
403,47 |
![]() |
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings
ISBN: 9783540201854 / Angielski / Miękka / 268 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th IFIP International Conference on Communications and Multimedia Security, CMS 2003, held in Torino, Italy in October 2003.The 21 revised full papers presented were carefully reviewed and selected for presentation. The papers are organized in topical sections on cryptography, network security, mobile and wireless network security, trust and privacy, application security, and multimedia security.
This book constitutes the refereed proceedings of the 7th IFIP International Conference on Communications and Multimedia Security, CMS 2003, held in T...
|
cena:
201,72 |
![]() |
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, Isi 2004, Tucson, Az, Usa, June 10-11, 2004, Proceed
ISBN: 9783540221258 / Angielski / Miękka / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The past two years have seen signi?cant interest and progress made in national and homeland security research in the areas of information technologies, orga- zational studies, and security-related public policy. Like medical and biological research, which is facing signi?cant information overload and yet also trem- dous opportunities for new innovation, the communities of law enforcement, criminal analysis, and intelligence are facing the same challenge. As medical - formatics and bioinformatics have become major ?elds of study, the science of intelligence and security informatics is now...
The past two years have seen signi?cant interest and progress made in national and homeland security research in the areas of information technologies...
|
cena:
403,47 |
![]() |
Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures
ISBN: 9783540289555 / Angielski / Miękka / 286 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The "Int- national School on Foundations of Security Analysis and Design" (FOSAD, see http: //www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea, especially for young researchers approaching the ?eld and graduate...
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing numb...
|
cena:
181,38 |
![]() |
Trustworthy Global Computing: International Symposium, Tgc 2005, Edinburgh, Uk, April 7-9, 2005. Revised Selected Papers
ISBN: 9783540300076 / Angielski / Miękka / 371 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, such as resource usage, language-based security, theories of trust and authentication, privacy, reliability and business integrity access control and mechanisms for enforcing them, and more.
Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, such as resource usage, lang...
|
cena:
201,72 |
![]() |
Electronic Government: 5th International Conference, EGOV 2006, Krakow, Poland, September 4-8, 2006, Proceedings
ISBN: 9783540376866 / Angielski / Miękka / 374 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents the refereed proceedings of the 5th International Conference on Electronic Government, EGOV 2006, held in in Krakow, Poland in conjunction with DEXA 2006. The book offers 31 revised papers depicting the state of the art in e-government/ e-governance, arranged in topical sections on research, review and outlook, participation and democracy, designing government services, legal dimensions in e-government, procurement and governance issues in networked governments, and more. This book presents the refereed proceedings of the 5th International Conference on Electronic Government, EGOV 2006, held in in Krakow, Poland in c... |
cena:
201,72 |
![]() |
Quantum Computing and Quantum Communications: First NASA International Conference, QCQC '98, Palm Springs, California, USA, February 17-20, 1998, Selected Papers
ISBN: 9783540655145 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text constitutes the strictly refereed post-proceedings of the First NASA International Conference on Quantum Computing and Quantum Communications, QCQC'98, held in Palm Springs, California, USA in February 1998. As the record of the large-scale meeting entirely devoted to quantum computing and communication, this book is a survey of developments in the area. The 43 carefully reviewed papers are organized in topical sections on entanglement and quantum algorithms, quantum cryptography, quantum copying and quantum information theory, quantum error correction and fault-tolerant quantum...
This text constitutes the strictly refereed post-proceedings of the First NASA International Conference on Quantum Computing and Quantum Communication...
|
cena:
201,72 |
![]() |
Information Security and Cryptology - ICISC'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings
ISBN: 9783540673804 / Angielski / Miękka / 284 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a?liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who...
The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KII...
|
cena:
201,72 |
![]() |
Theory of Cryptography: 4th Theory of Cryptography Conference, Tcc 2007, Amsterdam, the Netherlands, February 21-24, 2007, Proceedings
ISBN: 9783540709350 / Angielski / Miękka / 612 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in February 2007. The 31 revised full papers cover encryption, universally composable security, arguments and zero knowledge, notions of security, obfuscation, secret sharing and multiparty computation, signatures and watermarking, private approximation and black-box reductions, and key establishment. This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in Februa... |
cena:
403,47 |
![]() |
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
ISBN: 9783540710929 / Angielski / Miękka / 428 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006. Coverage in the 30 revised full papers includes public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, and mobile security. This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Isla... |
cena:
201,72 |
![]() |
Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6/WG 8.8/WG 11.2 International Workshop,
ISBN: 9783540723530 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin-...
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- ...
|
cena:
201,72 |
![]() |
Advances in Cryptology - EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, S
ISBN: 9783540725398 / Angielski / Miękka / 608 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007, held in Barcelona, Spain in May 2007. The 33 revised full papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniqu... |
cena:
201,72 |
![]() |
Transactions on Data Hiding and Multimedia Security II
ISBN: 9783540730910 / Angielski / Miękka / 136 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of... Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various appl... |
cena:
201,72 |
![]() |
Data and Applications Security XXI: 21st Annual Ifip Wg 11.3 Working Conference on Data and Applications Security, Redondo Beach, Ca, Usa, July 8-11,
ISBN: 9783540735335 / Angielski / Miękka / 294 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the papers presented at the 21st Annual IFIP WG 11.3 Conference on Data and Applications Security (DBSEC) held July 8 11 in - dondo Beach, California, USA. The purpose of the DBSEC conference is to disseminate original research results and experience reports in data and app- cations security. In response to the call for papers, 44 submissions were received. Following a rigorousreviewingprocess,18high-qualitypaperswereacceptedforpresentation and publication. In addition, two short papers were selected for poster pres- tation. The conference program also included one...
This volume contains the papers presented at the 21st Annual IFIP WG 11.3 Conference on Data and Applications Security (DBSEC) held July 8 11 in - don...
|
cena:
201,72 |
![]() |
Information Hiding: 8th International Workshop, Ih 2006, Alexandria, Va, Usa, July 10-12, 2006, Revised Seleceted Papers
ISBN: 9783540741237 / Angielski / Miękka / 402 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July 2006. Twenty-five carefully reviewed full papers are organized into topical sections covering watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels. This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July... |
cena:
201,72 |
![]() |
Secure Computer and Network Systems: Modeling, Analysis and Design
ISBN: 9780470023242 / Angielski / Twarda / 354 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.
This book presents quantitative modeling and... Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...
|
cena:
595,35 |
![]() |
Security and Software for Cybercafes
ISBN: 9781599049038 / Angielski / Twarda / 360 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery.
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are...
|
cena:
922,53 |
![]() |
Privacy Enhancing Technologies
ISBN: 9783540755500 / Angielski / Miękka / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held in conjunction with WOTE 2007, the IAVoSS Workshop on Trustworthy Elections. The papers cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held... |
cena:
201,72 |
![]() |
Error Control, Cryptology, and Speech Compression: Workshop on Information Protection, Moscow, Russia, December 6 - 9, 1993. Selected Papers
ISBN: 9783540582656 / Angielski / Miękka / 127 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume comprises a collection of papers presented at the Workshop on Information Protection, held in Moscow, Russia in December 1993. The 16 thoroughly refereed papers by internationally known scientists selected for this volume offer an exciting perspective on error control coding, cryptology, and speech compression. In the former Soviet Union, research related to information protection was often shielded from the international scientific community. Therefore, the results presented by Russian researchers and engineers at this first international workshop on this topic are of particular...
This volume comprises a collection of papers presented at the Workshop on Information Protection, held in Moscow, Russia in December 1993. The 16 thor...
|
cena:
201,72 |
![]() |
Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Turtorial Lectures
ISBN: 9783540748090 / Angielski / Miękka / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research groups, events, conferences, and summer schools that are studying it. This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007. The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research gro... |
cena:
201,72 |