wyszukanych pozycji: 50
![]() |
Network Security Metrics
ISBN: 9783319882598 / Angielski / Miękka / 2018 / 207 str. Termin realizacji zamówienia: ok. 20 dni roboczych. |
cena:
350,18 zł |
![]() |
Multilevel Secure Transaction Processing
ISBN: 9780792377023 / Angielski / Twarda / 1999 / 126 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems...
Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel se...
|
cena:
583,65 zł |
![]() |
Encyclopedia of Cryptography and Security
ISBN: 9781441959058 / Angielski / Miękka / 2011 / 1416 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography...
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive ...
|
cena:
3307,56 zł |
![]() |
Adaptive Autonomous Secure Cyber Systems
ISBN: 9783030334345 / Angielski / Miękka / 2021 / 289 str. Termin realizacji zamówienia: ok. 20 dni roboczych. |
cena:
622,57 zł |
![]() |
Adaptive Autonomous Secure Cyber Systems
ISBN: 9783030334314 / Angielski / Twarda / 2020 / 289 str. Termin realizacji zamówienia: ok. 20 dni roboczych. |
cena:
622,57 zł |
![]() |
Time Granularities in Databases, Data Mining, and Temporal Reasoning
ISBN: 9783540669975 / Angielski / Twarda / 2000 / 230 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Calendar units, such as months and days, clock units, such as hours and seconds, and specialized units, such as business days and academic years, play a major role in a wide range of information system applications. System support for reasoning about these units, called granularities in this book, is important for the efficient design, use, and implementation of such applications. The book deals with several aspects of temporal information and provides a unifying model for granularities. It is intended for computer scientists and engineers who are interested in the formal models and technical...
Calendar units, such as months and days, clock units, such as hours and seconds, and specialized units, such as business days and academic years, play...
|
cena:
194,52 zł |
![]() |
Applications of Data Mining in Computer Security
ISBN: 9781402070549 / Angielski / Twarda / 2002 / 252 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security. Data mining has been loosely defined as the process of... Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, lo... |
cena:
389,09 zł |
![]() |
Secure Data Management in Decentralized Systems
ISBN: 9781489996701 / Angielski / Miękka / 2014 / 462 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Database security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been conducted. Fruitful results have been produced, many of which are widely adopted in commercial and military database management systems. In recent years, the research scope of database security has been greatly expanded due to the rapid development of the global internetworked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of - ganizations....
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management sys...
|
cena:
428,00 zł |
![]() |
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings
ISBN: 9783642554148 / Angielski / Twarda / 2014 / 494 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014. The 27 revised full papers and 14 short papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on intrusion detection, data security, mobile security, privacy, metrics and risk assessment, information flow control, identity management, identifiability and decision making, malicious behavior and fraud and organizational security.
This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Mar...
|
cena:
389,09 zł |
![]() |
Trusted Recovery and Defensive Information Warfare
ISBN: 9781441949264 / Angielski / Miękka / 2010 / 133 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system.
Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted... Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prev...
|
cena:
389,09 zł |