![]() |
Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
ISBN: 9783540699712 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 13th Australasian Conference on Information Security and Privacy (ACISP 2008) was held at Wollongong, Australia, during July 7 9, 2008. The conference was sponsored by the Centre for Computer and Information Security of the University of Wollongong and the ResearchNetwork for a Secure Australia. The submission and review process was run using the iChair software, written by Thomas Baigneres and Matthieu Finiasz from EPFL, LASEC, Switzerland. We would like to thank them for letting us use their iChair software. The conferencereceived111submissions, out ofwhich the ProgramComm- tee selected...
The 13th Australasian Conference on Information Security and Privacy (ACISP 2008) was held at Wollongong, Australia, during July 7 9, 2008. The confer...
|
cena:
203,13 |
![]() |
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedi
ISBN: 9783540705413 / Angielski / Miękka / 292 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On behalf of the Program Committee, it is my pleasure to present the p- ceedings of the 5th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Every year since 2004 DIMVA has brought together leading researchers and practitionersfromacademia, governmentandindustrytopresentanddiscussnovel security research. DIMVA is organized by the Security Intrusion Detection and Response(SIDAR)specialinterestgroupoftheGermanInformaticsSociety(GI). The DIMVA 2008 Program Committee received 42 submissions from 16 d- ferent countries, and from...
On behalf of the Program Committee, it is my pleasure to present the p- ceedings of the 5th GI International Conference on Detection of Intrusions and...
|
cena:
203,13 |
![]() |
Data and Applications Security XXII: 22nd Annual Ifip Wg 11.3 Working Conference on Data and Applications Security London, Uk, July 13-16, 2008, Proce
ISBN: 9783540705666 / Angielski / Miękka / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don, UK, July 13-16, 2008. This year's working conference continued its tra- tion of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program that consists of 9 research paper s- sions with 22 high-quality research papers, which were selected from a total of 56 submissions after a rigorous reviewing process by the Program Committee members and...
This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don,...
|
cena:
203,13 |
![]() |
Privacy Enhancing Technologies: 8th International Symposium, Pets 2008 Leuven, Belgium, July 23-25, 2008 Proceedings
ISBN: 9783540706298 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 8thPrivacyEnhancing TechnologiesSymposium washeldat the Katholieke Universiteit Leuven during July 23 25,2008.This year completed the transition from workshop to symposium, with a printed proceedings published before the symposium. PETS remains a premier venue for publishing original research on privacy-enhancing technologies. PETS received 48 submissions, each of which wasreviewedbyatleastfourmembersoftheProgramCommittee.Thirteenwere accepted into the program, maintaining the selective and competitive nature of the event. The program also included a keynote address by Stuart Shapiro. A...
The 8thPrivacyEnhancing TechnologiesSymposium washeldat the Katholieke Universiteit Leuven during July 23 25,2008.This year completed the transition f...
|
cena:
203,13 |
![]() |
Host Identity Protocol (Hip): Towards the Secure Mobile Internet
ISBN: 9780470997901 / Angielski / Twarda / 332 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it." - Jari Arkko, Internet Area Director, IETF
One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol... "Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is...
|
cena:
448,53 |
![]() |
Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers
ISBN: 9783540852292 / Angielski / Miękka / 346 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2008. Financial cryptography (FC) and data security has been for years the main international forum for research, advanced development, education, exploration, and debate regarding information assurance in the context of ?nance and commerce. Despite the strong competition from other top-tier related security conf- ences, the Program Committee received a signi?cant number of submissions, indicating a growingacceptance of FC as the premier...
This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2...
|
cena:
203,13 |
![]() |
Computational Forensics: Second International Workshop, Iwcf 2008, Washington, DC, Usa, August 7-8, 2008, Proceedings
ISBN: 9783540853022 / Angielski / Miękka / 229 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the Second International Workshop on Computational Forensics (IWCF 2008), held August 7 8, 2008. It was a great honor for the organizers to host this scienti?c event at the renowned National Academy of Sciences: Keck Center in Washington, DC, USA. Computational Forensics is an emerging research domain focusing on the investigation of forensic problems using computational methods. Its primary goalis the discoveryand advancement of forensicknowledgeinvolving modeling, computer simulation, and computer-based...
This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the Second International Workshop on Computational Forensics (IW...
|
cena:
203,13 |
![]() |
Understanding and Applying Cryptography and Data Security
ISBN: 9781420061604 / Angielski / Twarda / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Addressing real-world implementation issues, this text emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. It focuses on cryptographic algorithms, such as symmetric- and public-key, before dealing with the construction of cryptographic protocols. The author examines tradeoffs between code size, hardware logic resource requirements, memory usage, speed, power consumption, and more. He includes many examples and problems to evaluate implementation results of several software and hardware languages. He also provides C and VHDL frameworks... Addressing real-world implementation issues, this text emphasizes cryptographic algorithm and protocol implementation in hardware, software, and em... |
cena:
694,06 |
![]() |
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets
ISBN: 9780750679954 / Angielski / Miękka / 270 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor. Nearly all books that address the topic of trade secrets have the "spy vs. spy" perspective. The author approaches the topic from a practical business perspective and not simply creating "paranoia" for paranoia's sake. The material for this book comes from the author's extensive work experience as a computer forensics...
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft ...
|
cena:
247,83 |
![]() |
Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection
ISBN: 9781599047089 / Angielski / Twarda / 476 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algorithms and approaches have been developed and proposed over the last decade, the statistically-based method remains the most common approach to anomaly intrusion detection.
Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algo...
|
cena:
850,26 |
![]() |
Sequences and Their Applications - Seta 2008: 5th International Conference Lexington, Ky, Usa, September 14-18, 2008, Proceedings
ISBN: 9783540859116 / Angielski / Miękka / 440 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the refereed proceedings papers of the Fifth International ConferenceonSequencesandtheirApplications(SETA2008), heldinLexington, Kentucky (USA), September 14-18, 2008. The conference SETA is well est- lished in the mathematics and computer science community. Topics of "SETA" include - Randomness of sequences - Correlation (periodic and aperiodic types) and combinatorial aspects of - quences (di?erence sets) - Sequences with applications in coding theory and cryptography - Sequences over ?nite ?elds/rings/function ?elds - Linear and nonlinear feedback shift register...
This volume contains the refereed proceedings papers of the Fifth International ConferenceonSequencesandtheirApplications(SETA2008), heldinLexington, ...
|
cena:
203,13 |
![]() |
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
ISBN: 9780596518165 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrat... |
cena:
187,81 |
![]() |
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
ISBN: 9781439801963 / Angielski / Twarda / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the... As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services... |
cena:
436,21 |
![]() |
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
ISBN: 9780596523022 / Angielski / Miękka / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime securi... |
cena:
116,19 |
![]() |
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
ISBN: 9783540858546 / Angielski / Miękka / 423 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, ...
|
cena:
580,94 |
![]() |
Securing Library Technology: A How-to-do-it Manual
ISBN: 9781555706395 / Angielski / Miękka / 245 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats--from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats. Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed...
A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting y...
|
cena:
386,00 |
![]() |
Progress in Cryptology -- INDOCRYPT 2003: 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings
ISBN: 9783540206095 / Angielski / Miękka / 436 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th International Conference on Cryptology in India, INDOCRYPT 2003, held in New Delhi, India in December 2003. The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on stream ciphers, block ciphers, Boolean functions, secret sharing, bilinear pairings, public key cryptography, signature schemes, protocols, elliptic curve cryptography and algebraic geometry, implementation and digital watermarking, and... This book constitutes the refereed proceedings of the 4th International Conference on Cryptology in India, INDOCRYPT 2003, held in New Delhi, India... |
cena:
203,13 |
![]() |
Fuzzing for Software Security Testing and Quality Assurance
ISBN: 9781596932142 / Angielski / Twarda / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Offering a powerful new tool to build secure, high-quality software, this resource helps developers think like a software cracker so they can find and patch flaws before harmful viruses, worms, and Trojans can rampage systems. Traditional software programmers and testers learn how to make fuzzing a standard practice.
Offering a powerful new tool to build secure, high-quality software, this resource helps developers think like a software cracker so they can find and...
|
cena:
410,35 |
![]() |
Intelligence and Security Informatics: International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings
ISBN: 9783540333616 / Angielski / Miękka / 188 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2004, respectively. In 2005, the IEEE International Conference on ISI was held in Atlanta, Georgia. These ISI conferences brought together academic researchers, law enforcement and intelligence experts, information technology consultants and practitioners to discuss their research and practice...
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and sy...
|
cena:
203,13 |
![]() |
Advances in Cryptology -- Asiacrypt 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai
ISBN: 9783540494751 / Angielski / Miękka / 470 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, stream ciphers, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures. This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Sec... |
cena:
203,13 |