Access Control, Security, and Trust: A Logical Approach
ISBN: 9781584888628 / Angielski / Twarda / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second... Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust:... |
|
cena:
570,57 zł |
Progress in Cryptology -- AFRICACRYPT 2009: Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009, Proceedings
ISBN: 9783642023835 / Angielski / Miękka / 435 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. AFRICACRYPT 2009washeld during June 21-25,2009in Gammarth, Tunisia. After AFRICACRYPT 2008 in Casablanca, Morocco, it was the second inter- tional research conference in Africa dedicated to cryptography. The conference received70 submissions;four of these wereidenti?ed as irr- ular submissions. The remaining papers went through a careful doubly ano- mous review process. Every paper received at least three reports; papers with a ProgramCommittee member asco-authorreceived?vereports.After the review period, 25 papers were accepted for presentation. The authors were requested to...
AFRICACRYPT 2009washeld during June 21-25,2009in Gammarth, Tunisia. After AFRICACRYPT 2008 in Casablanca, Morocco, it was the second inter- tional res...
|
|
cena:
192,30 zł |
Intrusion Detection: A Machine Learning Approach
ISBN: 9781848164475 / Angielski / Twarda / 184 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.
This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents th...
|
|
cena:
472,02 zł |
Cybersecurity: Geopolitics, Law, and Policy
ISBN: 9781138033290 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement and regulatory bodies and management of the complex relationships between them. In drawing on interviews conducted with experts from a wide range of fields, the book presents the reader with dilemmas and paradigms that confront law makers, corporate leaders, law enforcement, and national... This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspec... |
|
cena:
228,18 zł |
INFORMATION SECURITY OBJECTIVES AND PRACTICES - An Exploratory Study
ISBN: 9783639040937 / Angielski / Miękka / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information security is a management problem, not a technology one. Experience indicates that technology cannot provide all the answers to the problems posed by people in the context of information security management (ISM). Although many different frameworks and guidelines have been proposed by researchers, practitioners, consultants, government and organizations, current information security objectives and practices are inconsistent or misleading to practitioners. Concepts in the field of ISM are largely based on case studies, anecdotal evidence and the prescription of industry leaders ....
Information security is a management problem, not a technology one. Experience indicates that technology cannot provide all the answers to the problem...
|
|
cena:
307,73 zł |
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009, Proceedings
ISBN: 9783642013928 / Angielski / Miękka / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intelligence and Security Informatics (ISI) is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http: //isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the...
Intelligence and Security Informatics (ISI) is concerned with the study of the dev- opment and use of advanced information technologies and systems fo...
|
|
cena:
192,30 zł |
Computational Intelligence in Security for Information Systems: Cisis'09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings
ISBN: 9783642040900 / Angielski / Miękka / 216 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS 09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the different communities related to the field of intelligent systems for security. The global purpose of CISIS conferences has been to form a broad and...
The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS 09) presented the most recent developments ...
|
|
cena:
576,96 zł |
Handbook of Electronic Security and Digital Forensics
ISBN: 9789812837035 / Angielski / Twarda / 708 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. This book provides literature on e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence.
Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, ex...
|
|
cena:
1084,08 zł |
Digital Business Security Development: Management Technologies
ISBN: 9781605668062 / Angielski / Twarda / 240 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protection in digital environments. Containing state-of-the-art research relevant to informing business practice, this Premier Reference Source provides base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study.
Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protecti...
|
|
cena:
1043,19 zł |
Computational Forensics: Third International Workshop, Iwcf 2009, the Hague, the Netherlands, August 13-14, 2009, Proceedings
ISBN: 9783642035203 / Angielski / Miękka / 181 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ThisLectureNotesinComputerScience(LNCS)volumecontainsthepapersp- sentedatthe ThirdInternationalWorkshoponComputationalForensics(IWCF 2009), held August 13-14, 2009 at The Netherlands Forensic Institute in The Hague, The Netherlands. Computational forensics is a research domain focusing on the investigation of forensic problems using computational methods. Its primary goal is the d- covery and advancement of forensic knowledge involving modeling, computer simulation, and computer-based analysis and recognition in studying and so- ing forensic problems. The Computational Forensics Workshop...
ThisLectureNotesinComputerScience(LNCS)volumecontainsthepapersp- sentedatthe ThirdInternationalWorkshoponComputationalForensics(IWCF 2009), held Augus...
|
|
cena:
192,30 zł |
Electronic Government: 8th International Conference, EGOV 2009, Linz, Austria, August 31-September 3, 2009, Proceedings
ISBN: 9783642035159 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Years of worldwide economic depression do not only shatter private-sector ?rms and strain public-sector budgets, they also test the viability of academic conf- ences and other scholarly events. Given this context it is remarkable how well the eighth EGOV conference maintained its standing as an annual international conference with a global reach. Submissions from Europe increased over those from other parts of the globe. However, the conference upheld its attractiveness toscholarsfromaroundtheworldasavenueofhighreputation.The2009EGOV conference brought together scholars and practitioners from...
Years of worldwide economic depression do not only shatter private-sector ?rms and strain public-sector budgets, they also test the viability of acade...
|
|
cena:
192,30 zł |
Biometric ID Management and Multimodal Communication: Joint COST 2101 and 2102 International Conference, BioID_MultiComm 2009, Madrid, Spain, Septembe
ISBN: 9783642043901 / Angielski / Miękka / 376 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the research papers presented at the Joint COST 2101 & 2102 International Conference on Biometric ID Management and Multimodal Communi- tion, BioID_MultiComm 2009, hosted by the Biometric Recognition Group, ATVS, at the Escuela Politecnica Superior, Universidad Autonoma de Madrid, Spain, during September 16-18, 2009. BioID_MultiComm 2009 was a joint international conference organized coope- tively by COST Actions 2101 & 2102. COST 2101 Action focuses on "Biometrics for Identity Documents and Smart Cards (BIDS)," while COST 2102 Action is entitled "Cross-Modal Analysis of...
This volume contains the research papers presented at the Joint COST 2101 & 2102 International Conference on Biometric ID Management and Multimodal Co...
|
|
cena:
192,30 zł |
Critical Information Infrastructure Security: Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008
ISBN: 9783642035517 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the Third International Workshop on Critical Information Infrastructure Security (CRITIS 2008), which was held - tober 13-15, 2008 in Villa Mondragone (Rome), Italy, and was co-organized by AIIC (The Italian Society of Critical Infrastructures Experts) and ENEA (The Italian National Agency for New Technology, Energy and the Environment). This year's workshop was focused on an interdisciplinary and multifaced - alogue about the third millennium security strategies for critical information infrastructures (CII) and their protection (CIP). The aim was to...
This volume contains the proceedings of the Third International Workshop on Critical Information Infrastructure Security (CRITIS 2008), which was held...
|
|
cena:
192,30 zł |
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization
ISBN: 9781597494311 / Angielski / Miękka / 486 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those considering a migration into the virtualized world. It provides the tools and explanations needed to create a fresh virtualization environment. Readers walk through step-by-step instructions on everything from building a Windows 2008 server to installing and configuring Hyper-V and App-V. The book begins with the basics of virtualization, including the role of virtualization in the changing landscape of the traditional data center and its benefits,...
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those conside...
|
|
cena:
181,49 zł |
Enterprise Security for the Executive: Setting the Tone from the Top
ISBN: 9780313376603 / Angielski / Twarda / 163 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Enterprise Security for the Executive: Setting the Tone from the Top" is designed to help business executives become familiar with security concepts and techniques to make sure they are able to manage and support the efforts of their security team. It is the first such work to define the leadership role for executives in any business's security apparatus. In "Enterprise Security for the Executive," author Jennifer Bayuk, a highly regarded information security specialist and sought-after consultant and speaker, explains protocols and technologies at just the right level of depth for the... "Enterprise Security for the Executive: Setting the Tone from the Top" is designed to help business executives become familiar with security concep... |
|
cena:
316,68 zł |
Cyber-Security and Threat Politics: Us Efforts to Secure the Information Age
ISBN: 9780415569880 / Angielski / Miękka / 182 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat... This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in ... |
|
cena:
228,18 zł |
Advances in Network and Distributed Systems Security: Ifip Tc11 Wg11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuve
ISBN: 9780792375586 / Angielski / Twarda / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence,...
The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts ...
|
|
cena:
576,96 zł |
Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings
ISBN: 9781439825129 / Angielski / Twarda / 331 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted killings and kidnappings. The author, a former SWAT and JTTF team member whose experience includes providing protection to diplomats, high-ranking military personnel, prosecutors, and organized crime informants presents a wealth of global statistics on assassinations,... Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Ass... |
|
cena:
700,25 zł |
Advances in Information and Computer Security: 4th International Workshop on Security, Iwsec 2009 Toyama, Japan, October 28-30, 2009 Proceedings
ISBN: 9783642048456 / Angielski / Miękka / 229 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Fourth International Workshop on Security (IWSEC 2009) was held at Toyama International Conference Center, Toyama, Japan, October 28-30, 2009. The workshop was co-organized by CSEC, a special interest group on computer security of the IPSJ (Information Processing Society of Japan) and ISEC, a technical group on information security of IEICE (The Institute of Electronics, Information and Communication Engineers). The excellent Local Organizing Committee was led by the IWSEC 2009 General Co-chairs, Kazuo Takaragi and Hiroaki Kikuchi....
The Fourth International Workshop on Security (IWSEC 2009) was held at Toyama International Conference Center, Toyama, Japan, October 28-30, 2009. The...
|
|
cena:
192,30 zł |
Enterprise Cyber Security: principles and practice
ISBN: 9781492148791 / Angielski / Miękka / 284 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
319,73 zł |