Information Security Management, Education and Privacy: Ifip 18th World Computer Congress Tc11 19th International Information Security Workshops 22-27
ISBN: 9781402081446 / Angielski / Twarda / 313 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that are currently particularly active in Security. The first one is the 10th IFIP Annual Working Conference on Information Security Management. It is organized by the IFIP WG 11. 1, which is itself dedicated to Information Security Management, i. e., not only to the practical implementation of new security technology issued from recent research and development, but also and mostly to the improvement of security practice in all organizations, from...
This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that ar...
|
|
cena:
384,63 zł |
Network Control and Engineering for QoS, Security and Mobility, V
ISBN: 9780387348254 / Angielski / Twarda / 236 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The increasing demand for sophisticated network applications, allied to the growth of the Internet traffic, has lead to great efforts in the search of improvements in data transmission technologies with the intention of satisfying the increasing demand for bandwidth. So far as optical networking is concerned, WDM (Wavelength Division Multiplexing) appears as the main advance in the transmission area, because it allows transmission rates near to the theoretical limit of optical fibers, of the order of dozens of terabits a second 1]. An essential issue in optical network design is defining how...
The increasing demand for sophisticated network applications, allied to the growth of the Internet traffic, has lead to great efforts in the search of...
|
|
cena:
384,63 zł |
Network Control and Engineering for Qos, Security and Mobility, III: Ifip Tc6 / Wg6.2, 6.6, 6.7 and 6.8. Third International Conference on Network Con
ISBN: 9780387231976 / Angielski / Twarda / 348 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con'2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004. This IFIP TC6 Conference was organized by the Universitat de les Illes Balears and sponsored by the following Working Groups: WG6.2 (Network and Internetwork Architectures), WG6.6 (Management of Networks and Distributed Systems), WG6.7 (Smart Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking...
This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mob...
|
|
cena:
576,96 zł |
Information Security Applications: 9th International Workshop, Wisa 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
ISBN: 9783642003059 / Angielski / Miękka / 348 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 9th International Workshop on Information Security Applications (WISA 2008) was held in Jeju Island, Korea during September 23-25, 2008. The wo- shop was sponsoredby the Korea Institute of Information Security and Crypt- ogy(KIISC), theElectronicsandTelecommunicationsResearchInstitute(ETRI) and the Ministry of Knowledge Economy (MKE). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We were...
The 9th International Workshop on Information Security Applications (WISA 2008) was held in Jeju Island, Korea during September 23-25, 2008. The wo- s...
|
|
cena:
192,30 zł |
Distributed Systems Security: Issues, Processes and Solutions
ISBN: 9780470519882 / Angielski / Twarda / 328 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How to solve security issues and problems arising in distributed systems.
Security is one of the leading concerns in developing dependable distributed systems of today, since the integration of different components in a distributed manner creates new security problems and issues. Service oriented architectures, the Web, grid computing and virtualization - form the backbone of today's distributed systems. A lens to security issues in distributed systems is best provided via deeper exploration of security concerns and solutions in these technologies. Distributed Systems... How to solve security issues and problems arising in distributed systems.
Security is one of the leading concerns in developing dependable d... |
|
cena:
452,91 zł |
Security Risk Management Body of Knowledge
ISBN: 9780470454626 / Angielski / Twarda / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Risk Management Body of Knowledge Wiley Series in Systems Engineering and Management Andrew P. Sage, Series Editor Julian Talbot & Miles Jakeman Security Risk Management Body of Knowledge Wiley Series in Systems Engineering and Management Andrew P. Sage, Series Editor Julian Talbot & Mil... |
|
cena:
507,51 zł |
Policing Organized Crime: Intelligence Strategy Implementation
ISBN: 9781439810149 / Angielski / Twarda / 286 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When criminal activity is as straightforward as a child s game of cops and robbers, the role of the police is obvious, but today s bad guys don t always wear black. In fact, the most difficult criminals to cope with are those who straddle the gray divide between licit and illicit activity. Many of these nefarious sorts operate on the fringe of society, often acting the part of businesspersons, meeting the demands of otherwise law-abiding clientele with illegally procured or delivered goods. Others, specially trained to occupy positions of responsibility, make the most of position and... When criminal activity is as straightforward as a child s game of cops and robbers, the role of the police is obvious, but today s bad guys don t a... |
|
cena:
700,25 zł |
Information Security Management : Concepts and Practice
ISBN: 9781420078541 / Angielski / Twarda / 871 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Corporate information security is crucial for generating continuous business value in the modern world. This book presents a security audit methodology that conforms to the new security standard ISO 27001.
Corporate information security is crucial for generating continuous business value in the modern world. This book presents a security audit methodolog...
|
|
cena:
492,71 zł |
Theory of Cryptography: Sixth Theory of Cryptography Conference, Tcc 2009, San Francisco, Ca, Usa, March 15-17, 2009, Proceedings
ISBN: 9783642004568 / Angielski / Miękka / 613 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TCC 2009, the 6th Theory of Cryptography Conference, was held in San Fr- cisco, CA, USA, March 15-17, 2009. TCC 2009 was sponsored by the Inter- tional Association for Cryptologic Research (IACR) and was organized in - operation with the Applied Crypto Group at Stanford University. The General Chair of the conference was Dan Boneh. The conference received 109 submissions, of which the Program Comm- tee selected 33 for presentation at the conference. These proceedings consist of revised versions of those 33 papers. The revisions were not reviewed, and the authors bear full responsibility for...
TCC 2009, the 6th Theory of Cryptography Conference, was held in San Fr- cisco, CA, USA, March 15-17, 2009. TCC 2009 was sponsored by the Inter- tiona...
|
|
cena:
384,63 zł |
Virtual Goods: Technology, Economy & Legal Aspects
ISBN: 9781604564860 / Angielski / Twarda / 294 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Virtual goods is one of the most important topics for research, development, and implementation. It has influence on technology, business, and politics. While the discussion on legal aspects is highly political, fresh technologies are coming up. This book
Virtual goods is one of the most important topics for research, development, and implementation. It has influence on technology, business, and politic...
|
|
cena:
508,27 zł |
Computer Attack & Cyberterrorism
ISBN: 9781606923375 / Angielski / Miękka / 75 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Reports from security organisations show that random attacks are now increasingly implemented through use of automated tools, called 'bots', that direct large numbers of compromised computers to launch attacks through the Internet as swarms. This book prov
Reports from security organisations show that random attacks are now increasingly implemented through use of automated tools, called 'bots', that dire...
|
|
cena:
274,86 zł |
Information Security and Cryptoloy - ICISC 2008: 11th International Conference Seoul, Korea, December 3-5, 2008 Revised Selected Papers
ISBN: 9783642007293 / Angielski / Miękka / 433 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ICISC 2008, the 11th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 3-5, 2008. It was or- nized by the Korea Institute of Information Security and Cryptology (KIISC). The aim of this conference was to provide a forum for the presentation of new results in research, development, and applications in the ?eld of infor- tion security and cryptology. It also served as a place for research information exchange. The conference received131submissions from28 countries, coveringall areas of information security and cryptology. The review and...
ICISC 2008, the 11th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 3-5, 2008. It was or- ...
|
|
cena:
192,30 zł |
Police Leadership in a Democracy: Conversations with America's Police Chiefs
ISBN: 9781439808344 / Angielski / Miękka / 158 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Every day the media floods the airwaves with their often-contradictory version of the role and behavior of the police force. Based on this, you might think that police officers either brutally enforce their own interpretation of the nation s laws or use all the modern tools available to carefully and persistently uncover the special clues that lead to the identification and arrest of suspected criminals. Based on interviews with 26 police chiefs, Police Leadership in a Democracy: Conversations with America s Police Chiefs takes a poignant journey through the minds of the... Every day the media floods the airwaves with their often-contradictory version of the role and behavior of the police force. Based on this, you mig... |
|
cena:
357,85 zł |
Advances in Cryptology - Eurocrypt 2009
ISBN: 9783642010002 / Angielski / Miękka / 609 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. You are holding the proceedings of Eurocrypt 2009, the 28th Annual Inter- tional Conferenceon the Theoryand Applications of CryptographicTechniques. This conference was organized by the International Association for Cryptologic Research in cooperation with the Horst Gort ] z Institute for IT-Security at the Ruhr-Universit] at Bochum. The local organization received additional support from several sponsors: Horst G] ortz Stiftung, Deutsche Forschungsgemeinschaft, Bochum 2015, Secunet, NXP, IET, Taylor & Francis, AuthentiDate. The c- ference was held in Cologne, Germany. The Eurocrypt 2009...
You are holding the proceedings of Eurocrypt 2009, the 28th Annual Inter- tional Conferenceon the Theoryand Applications of CryptographicTechniques. T...
|
|
cena:
192,30 zł |
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
ISBN: 9780071626750 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive Eradicate the Most Notorious Insecure Designs and Coding... "What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engine... |
|
cena:
296,31 zł |
FISMA Principles and Best Practices: Beyond Compliance
ISBN: 9781420078299 / Angielski / Twarda / 345 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In light of the legislation such as the Federal Information Security Management Act (FISMA), there is an increased need to measure the ability of government organizations and companies subject to the standards to protect information. This book provides practical guidelines for addressing FISMA compliance.
In light of the legislation such as the Federal Information Security Management Act (FISMA), there is an increased need to measure the ability of gove...
|
|
cena:
622,44 zł |
Understanding Digital Signatures: Establishing Trust Over the Internet and Other Networks
ISBN: 9780070125544 / Angielski / Miękka / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to buy, sell, sign documents and exchange sensitive financial data on the Internet.
This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to b...
|
|
cena:
183,02 zł |
Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition
ISBN: 9781439818077 / Angielski / Twarda / 440 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Drawing on the authors' use of the Hadamard-related theory in several successful engineering projects, Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition explores the applications and dimensions of Hadamard matrices. This edition contains a new section on the applications of higher-dimensional Hadamard matrices to the areas of telecommunications and information security. The first part of the book presents fast algorithms, updated constructions, existence results, and generalized forms for Walsh and Hadamard matrices. The second... Drawing on the authors' use of the Hadamard-related theory in several successful engineering projects, Theory and Applications of Higher-Di... |
|
cena:
907,73 zł |
Harboring Data: Information Security, Law, and the Corporation
ISBN: 9780804760089 / Angielski / Twarda / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, Harboring Data reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics,...
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and th...
|
|
cena:
233,42 zł |
HP Nonstop Server Security: A Practical Handbook
ISBN: 9781555583149 / Angielski / Miękka / 656 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken on the task of supplying a new Handbook whose content provides current, generic information about securing HP NonStop servers. Emphasis is placed on explaining security risks and best practices relevant to NonStop environments, and how to deploy native security tools (Guardian and Safeguard). All third party vendors who supply security solutions relevant to NonStop servers are listed, along with contact information for each vendor. The Handbook...
Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken o...
|
|
cena:
513,51 zł |