![]() |
Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings
ISBN: 9783540410317 / Angielski / Miękka / 330 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000.
The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents. his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in O...
|
cena:
200,77 |
![]() |
Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings
ISBN: 9783540640400 / Angielski / Miękka / 220 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the strictly refereed post-workshop proceedings of the 5th International Workshop on Security Protocols, held in Paris, France, in April 1997. The 17 revised full papers presented address all current aspects of security protocols. Among the topics covered are secure distribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryprographic protocols, authentication, threshold systems, secret sharing, ect.
This book constitutes the strictly refereed post-workshop proceedings of the 5th International Workshop on Security Protocols, held in Paris, France, ...
|
cena:
200,77 |
![]() |
Trust and Security in Collaborative Computing
ISBN: 9789812703682 / Angielski / Twarda / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing -- one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing....
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full ut...
|
cena:
546,68 |
![]() |
Security and Software for Cybercafes
ISBN: 9781599049038 / Angielski / Twarda / 360 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery.
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are...
|
cena:
909,96 |
![]() |
Info Security Risk Management
ISBN: 9780471762546 / Angielski / Twarda / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
|
cena:
514,09 |
![]() |
Cellular Authentication for Mobile and Internet Services
ISBN: 9780470723173 / Angielski / Twarda / 212 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. An invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and integration into existing networks
Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure web browsing with a phone or PC, Single Sign-On (SSO), mobile broadcast content protection, secure location services, etc. The book discusses the Generic Authentication Architecture (GAA) of the mobile standardization body 3rd Generation Partnership Project (3GPP)... An invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and integration into existing networks<...
|
cena:
386,79 |
![]() |
Sicherheit in Kommunikationsnetzen
ISBN: 9783486720167 / Niemiecki / Miękka / 274 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fast taglich werden neue Angriffe auf IT-Systeme bekannt, bei denen sensible Daten entwendet werden. Das vorliegende Buch vermittelt die wesentlichen Grundlagen und Technologien, die zur Absicherung von Computernetzwerken benotigt werden. Stets legen die Autoren dabei Wert auf eine verstandliche Darstellung, die - soweit moglich - auf abstrakte Modelle und formalen Notationen verzichtet. Zu jedem Kapitel werden Aufgaben zur Kontrolle von Wissensstand und Verstandnis angeboten.
Fast taglich werden neue Angriffe auf IT-Systeme bekannt, bei denen sensible Daten entwendet werden. Das vorliegende Buch vermittelt die wesentlichen ...
|
cena:
126,97 |
![]() |
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
ISBN: 9780596518165 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrat... |
cena:
183,28 |
![]() |
Coding and Cryptology - Proceedings of the First International Workshop
ISBN: 9789812832238 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
503,14 |
![]() |
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
ISBN: 9780596523022 / Angielski / Miękka / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime securi... |
cena:
113,99 |
![]() |
E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development
ISBN: 9781605663883 / Angielski / Twarda / 390 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information and communication technology (ICT) innovations provide significant implications for business and socioeconomic development due to the role it plays in the diffusion of knowledge sharing, community development, and equality. E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development provides comprehensive coverage and definitions of the most important issues, concepts, trends, and technologies related to the adoption, diffusion, and adaptation of national electronic strategies for ICTs in socioeconomic development. This book...
Information and communication technology (ICT) innovations provide significant implications for business and socioeconomic development due to the role...
|
cena:
909,96 |
![]() |
Hacking: The Next Generation
ISBN: 9780596154578 / Angielski / Miękka / 298 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a ... |
cena:
152,00 |
![]() |
Computer and Network Technology - Proceedings of the International Conference on Iccnt 2009
ISBN: 9789814289672 / Angielski / Miękka / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ICCNT is the main annual computer and network research conference in Chennai that presents cutting edge research work. It will act as a platform for scientists, scholars, and students from universities all around the world to present research and hence foster better research relations between universities and the computer and networking industry.
ICCNT is the main annual computer and network research conference in Chennai that presents cutting edge research work. It will act as a platform for s...
|
cena:
532,17 |
![]() |
Serious Game Design and Development: Technologies for Training and Learning
ISBN: 9781615207398 / Angielski / Twarda / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Serious Game Design and Development: Technologies for Training and Learning examines high-tech delivery of pedagogical content in a simulated environment that engenders a deeper learning in an entertaining manner.
Serious Game Design and Development: Technologies for Training and Learning examines high-tech delivery of pedagogical content in a simulated environm...
|
cena:
909,96 |
![]() |
Surviving Cyberwar
ISBN: 9781605906881 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a...
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon ar...
|
cena:
246,73 |
![]() |
Pervasive Information Security and Privacy Developments: Trends and Advancements
ISBN: 9781616920005 / Angielski / Twarda / 468 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Offers methodologies, research frameworks, theory development and validation, case studies, simulations, technological architectures, infrastructure issues in design, and implementation of secure and privacy preserving initiatives.
Offers methodologies, research frameworks, theory development and validation, case studies, simulations, technological architectures, infrastructure i...
|
cena:
909,96 |
![]() |
ICT Acceptance, Investment and Organization: Cultural Practices and Values in the Arab World
ISBN: 9781609600488 / Angielski / Twarda / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is a unique source of information outlining the importance of Information Communication Technology (ICT) adoption and diffusion, covering the Arab world's strong need for access to information systems, while still paying close attention to their culture and localization of practices -- Provided by publisher.
This book is a unique source of information outlining the importance of Information Communication Technology (ICT) adoption and diffusion, covering th...
|
cena:
909,96 |
![]() |
Swanson on Internal Auditing: Raising the Bar
ISBN: 9781849280679 / Miękka / 341 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A wealth of knowledge on internal auditing all in one place ... A must-read for corporate executives, IT staff, board members, security and auditing practitioners, and more.
A wealth of knowledge on internal auditing all in one place ... A must-read for corporate executives, IT staff, board members, security and auditing p...
|
cena:
199,35 |
![]() |
Microsoft Windows Intune 2.0: QuickStart Administration
ISBN: 9781849682961 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7 so your computers and users can operate at peak performance all the time. This step-by-step guide will show you how to plan, set up and maintain Windows Intune, showing you how to manage a group of PCs (either 1 business or several if a partner) from the base operating system, through to the patches, anti-malware solution and deployed software and policies from a central console, using the Windows Intune service. This book...
Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud se...
|
cena:
234,10 |
![]() |
Digital Identity and Access Management: Technologies and Frameworks
ISBN: 9781613504987 / Angielski / Twarda / 428 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals' access to resources and services. However, administering digital identities and system access rights can be challenging even under stable conditions. Digital Identity and Access Management: Technologies and Frameworks explores important and emerging advancements in DIAM systems. The book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of...
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm ident...
|
cena:
985,79 |