Open Source Systems Security Certification
ISBN: 9780387773230 / Angielski / Twarda / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Open Source Advances in Computer Applications book series provides timely technological and business information for: Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies; Inserting OSS in the critical path of complex network development and embedded products, including methodologies and tools for domain-specific OSS testing (lab code available), plus certification of security, dependability and safety properties for complex systems; Ensuring integrated systems,... Open Source Advances in Computer Applications book series provides timely technological and business information for: ... |
|
cena:
384,63 zł |
Information Security
ISBN: 9780470131183 / Angielski / Twarda / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Growing Imperative Need for Effective Information Security Governance
With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that... The Growing Imperative Need for Effective Information Security Governance
With monotonous regularity, headlines announce ever more spectacular fail... |
|
cena:
469,29 zł |
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedi
ISBN: 9783540705413 / Angielski / Miękka / 292 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On behalf of the Program Committee, it is my pleasure to present the p- ceedings of the 5th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Every year since 2004 DIMVA has brought together leading researchers and practitionersfromacademia, governmentandindustrytopresentanddiscussnovel security research. DIMVA is organized by the Security Intrusion Detection and Response(SIDAR)specialinterestgroupoftheGermanInformaticsSociety(GI). The DIMVA 2008 Program Committee received 42 submissions from 16 d- ferent countries, and from...
On behalf of the Program Committee, it is my pleasure to present the p- ceedings of the 5th GI International Conference on Detection of Intrusions and...
|
|
cena:
192,30 zł |
Data and Applications Security XXII: 22nd Annual Ifip Wg 11.3 Working Conference on Data and Applications Security London, Uk, July 13-16, 2008, Proce
ISBN: 9783540705666 / Angielski / Miękka / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don, UK, July 13-16, 2008. This year's working conference continued its tra- tion of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program that consists of 9 research paper s- sions with 22 high-quality research papers, which were selected from a total of 56 submissions after a rigorous reviewing process by the Program Committee members and...
This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don,...
|
|
cena:
192,30 zł |
Privacy Enhancing Technologies: 8th International Symposium, Pets 2008 Leuven, Belgium, July 23-25, 2008 Proceedings
ISBN: 9783540706298 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 8thPrivacyEnhancing TechnologiesSymposium washeldat the Katholieke Universiteit Leuven during July 23 25,2008.This year completed the transition from workshop to symposium, with a printed proceedings published before the symposium. PETS remains a premier venue for publishing original research on privacy-enhancing technologies. PETS received 48 submissions, each of which wasreviewedbyatleastfourmembersoftheProgramCommittee.Thirteenwere accepted into the program, maintaining the selective and competitive nature of the event. The program also included a keynote address by Stuart Shapiro. A...
The 8thPrivacyEnhancing TechnologiesSymposium washeldat the Katholieke Universiteit Leuven during July 23 25,2008.This year completed the transition f...
|
|
cena:
192,30 zł |
Host Identity Protocol (Hip): Towards the Secure Mobile Internet
ISBN: 9780470997901 / Angielski / Twarda / 332 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it." - Jari Arkko, Internet Area Director, IETF
One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol... "Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is...
|
|
cena:
469,29 zł |
Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers
ISBN: 9783540852292 / Angielski / Miękka / 346 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2008. Financial cryptography (FC) and data security has been for years the main international forum for research, advanced development, education, exploration, and debate regarding information assurance in the context of ?nance and commerce. Despite the strong competition from other top-tier related security conf- ences, the Program Committee received a signi?cant number of submissions, indicating a growingacceptance of FC as the premier...
This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2...
|
|
cena:
192,30 zł |
Computational Forensics: Second International Workshop, Iwcf 2008, Washington, DC, Usa, August 7-8, 2008, Proceedings
ISBN: 9783540853022 / Angielski / Miękka / 229 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the Second International Workshop on Computational Forensics (IWCF 2008), held August 7 8, 2008. It was a great honor for the organizers to host this scienti?c event at the renowned National Academy of Sciences: Keck Center in Washington, DC, USA. Computational Forensics is an emerging research domain focusing on the investigation of forensic problems using computational methods. Its primary goalis the discoveryand advancement of forensicknowledgeinvolving modeling, computer simulation, and computer-based...
This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the Second International Workshop on Computational Forensics (IW...
|
|
cena:
192,30 zł |
Creating a National Framework for Cybersecurity: An Analysis of Issues & Options
ISBN: 9781604565591 / Angielski / Miękka / 92 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Even before the terrorist attacks of September 2001, concerns had been rising among security experts about the vulnerabilities to attack of computer systems and associated infrastructure. This book addresses each of those questions in turn.
Even before the terrorist attacks of September 2001, concerns had been rising among security experts about the vulnerabilities to attack of computer s...
|
|
cena:
207,43 zł |
Understanding and Applying Cryptography and Data Security
ISBN: 9781420061604 / Angielski / Twarda / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Addressing real-world implementation issues, this text emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. It focuses on cryptographic algorithms, such as symmetric- and public-key, before dealing with the construction of cryptographic protocols. The author examines tradeoffs between code size, hardware logic resource requirements, memory usage, speed, power consumption, and more. He includes many examples and problems to evaluate implementation results of several software and hardware languages. He also provides C and VHDL frameworks... Addressing real-world implementation issues, this text emphasizes cryptographic algorithm and protocol implementation in hardware, software, and em... |
|
cena:
622,44 zł |
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets
ISBN: 9780750679954 / Angielski / Miękka / 270 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor. Nearly all books that address the topic of trade secrets have the "spy vs. spy" perspective. The author approaches the topic from a practical business perspective and not simply creating "paranoia" for paranoia's sake. The material for this book comes from the author's extensive work experience as a computer forensics...
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft ...
|
|
cena:
259,30 zł |
Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection
ISBN: 9781599047089 / Angielski / Twarda / 476 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algorithms and approaches have been developed and proposed over the last decade, the statistically-based method remains the most common approach to anomaly intrusion detection.
Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algo...
|
|
cena:
956,26 zł |
Sequences and Their Applications - Seta 2008: 5th International Conference Lexington, Ky, Usa, September 14-18, 2008, Proceedings
ISBN: 9783540859116 / Angielski / Miękka / 440 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the refereed proceedings papers of the Fifth International ConferenceonSequencesandtheirApplications(SETA2008), heldinLexington, Kentucky (USA), September 14-18, 2008. The conference SETA is well est- lished in the mathematics and computer science community. Topics of "SETA" include - Randomness of sequences - Correlation (periodic and aperiodic types) and combinatorial aspects of - quences (di?erence sets) - Sequences with applications in coding theory and cryptography - Sequences over ?nite ?elds/rings/function ?elds - Linear and nonlinear feedback shift register...
This volume contains the refereed proceedings papers of the Fifth International ConferenceonSequencesandtheirApplications(SETA2008), heldinLexington, ...
|
|
cena:
192,30 zł |
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
ISBN: 9780596518165 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrat... |
|
cena:
196,51 zł |
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
ISBN: 9781439801963 / Angielski / Twarda / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the... As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services... |
|
cena:
414,91 zł |
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
ISBN: 9780596523022 / Angielski / Miękka / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime securi... |
|
cena:
130,68 zł |
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
ISBN: 9783540858546 / Angielski / Miękka / 423 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, ...
|
|
cena:
334,62 zł |
Management of Information Security, Loose-Leaf Version
ISBN: 9781337685672 / Angielski / Luźne kartki (loose leaf) / 672 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
596,64 zł |
Securing Library Technology: A How-to-do-it Manual
ISBN: 9781555706395 / Angielski / Miękka / 245 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats--from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats. Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed...
A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting y...
|
|
cena:
433,34 zł |
Progress in Cryptology -- INDOCRYPT 2003: 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings
ISBN: 9783540206095 / Angielski / Miękka / 436 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th International Conference on Cryptology in India, INDOCRYPT 2003, held in New Delhi, India in December 2003. The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on stream ciphers, block ciphers, Boolean functions, secret sharing, bilinear pairings, public key cryptography, signature schemes, protocols, elliptic curve cryptography and algebraic geometry, implementation and digital watermarking, and... This book constitutes the refereed proceedings of the 4th International Conference on Cryptology in India, INDOCRYPT 2003, held in New Delhi, India... |
|
cena:
192,30 zł |