2005, ISBN: 9783540255840
[ED: Taschenbuch], [PU: Springer Berlin Heidelberg], Neuware - The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. A… mais…
booklooker.de |
Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings - nuovo livro
2005, ISBN: 3540255842
2005 Kartoniert / Broschiert Informationstechnologie, IT, Technologie / Informationstechnologie, Internet / Protokolle, Sicherheit, Technik, Wirtschaftsmathematik und -informatik, IT-Ma… mais…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Custos de envio:Geen versendingskosten in Duitsland. (EUR 0.00) Details... |
Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings - nuovo livro
2005, ISBN: 3540255842
2005 Kartoniert / Broschiert Informationstechnologie, IT, Technologie / Informationstechnologie, Internet / Protokolle, Sicherheit, Technik, Wirtschaftsmathematik und -informatik, IT-Ma… mais…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Custos de envio:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
2005, ISBN: 9783540255840
Editor: Deng, Robert H. Editor: Bao, Feng, Editor: Pang, HweeHwa, Editor: Zhou, Jianying, Springer, Paperback, Auflage: 2005, 440 Seiten, Publiziert: 2005-04-05T00:00:01Z, Produktgruppe: … mais…
amazon.co.uk BOOKS etc Gebraucht, wie neu. Custos de envio:Usually dispatched within 13 to 14 days. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 5.61) Details... |
Information Security Practice and Experience : First International Conference; ISPEC 2005; Singapore; April 11-14; 2005; Proceedings - Livro de bolso
2005, ISBN: 3540255842
[EAN: 9783540255840], Neubuch, [PU: Springer], PRINT ON DEMAND Book; New; Fast Shipping from the UK., Books
AbeBooks.de Ria Christie Collections, Uxbridge, United Kingdom [59718070] [Rating: 5 (von 5)] NEW BOOK. Custos de envio: EUR 1.74 Details... |
2005, ISBN: 9783540255840
[ED: Taschenbuch], [PU: Springer Berlin Heidelberg], Neuware - The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. A… mais…
Deng, Robert H. (Herausgeber); Zhou, Jianying (Herausgeber); Pang, Hweehwa (Herausgeber); Bao, Feng (Herausgeber):
Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings - nuovo livro2005, ISBN: 3540255842
2005 Kartoniert / Broschiert Informationstechnologie, IT, Technologie / Informationstechnologie, Internet / Protokolle, Sicherheit, Technik, Wirtschaftsmathematik und -informatik, IT-Ma… mais…
Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings - nuovo livro
2005
ISBN: 3540255842
2005 Kartoniert / Broschiert Informationstechnologie, IT, Technologie / Informationstechnologie, Internet / Protokolle, Sicherheit, Technik, Wirtschaftsmathematik und -informatik, IT-Ma… mais…
no/na amazon.co.uk
2005, ISBN: 9783540255840
Editor: Deng, Robert H. Editor: Bao, Feng, Editor: Pang, HweeHwa, Editor: Zhou, Jianying, Springer, Paperback, Auflage: 2005, 440 Seiten, Publiziert: 2005-04-05T00:00:01Z, Produktgruppe: … mais…
Information Security Practice and Experience : First International Conference; ISPEC 2005; Singapore; April 11-14; 2005; Proceedings - Livro de bolso
2005, ISBN: 3540255842
[EAN: 9783540255840], Neubuch, [PU: Springer], PRINT ON DEMAND Book; New; Fast Shipping from the UK., Books
Dados bibliográficos do melhor livro correspondente
Autor: | |
Título: | |
Número ISBN: |
Dados detalhados do livro - Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings: 3439 (Lecture Notes in Computer Science, 3439)
EAN (ISBN-13): 9783540255840
ISBN (ISBN-10): 3540255842
Livro de bolso
Ano de publicação: 2005
Editor/Editora: Springer
440 Páginas
Peso: 0,661 kg
Língua: eng/Englisch
Livro na base de dados desde 2008-02-11T21:55:12-02:00 (Sao Paulo)
Página de detalhes modificada pela última vez em 2024-02-26T08:09:58-03:00 (Sao Paulo)
Número ISBN/EAN: 3540255842
Número ISBN - Ortografia alternativa:
3-540-25584-2, 978-3-540-25584-0
Ortografia alternativa e termos de pesquisa relacionados:
Autor do livro: feng, bäö, may pang, zhou
Título do livro: computer security, information security practice experience, security first, proceedings, security 2005, the singapore experience
Dados da editora
Autor: Robert H. Deng; Feng Bao; HweeHwa Pang; Jianying Zhou
Título: Lecture Notes in Computer Science; Security and Cryptology; Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings
Editora: Springer; Springer Berlin
428 Páginas
Ano de publicação: 2005-04-05
Berlin; Heidelberg; DE
Língua: Inglês
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XII, 428 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; DRM; Denial of Service; Information; Routing; Session; authentication; information security; installatioin; intrusion detection; network security; oblivious transfer; secure communications; security; systems security; trust; Cryptology; Computer Communication Networks; Operating Systems; Computers and Society; IT Operations; Information Storage and Retrieval; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Betriebssysteme; Digital- und Informationstechnologien: soziale und ethische Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; Informationsrückgewinnung, Information Retrieval; Data Warehousing; EA
Network Security.- Risk Assessment of Production Networks Using Honeynets – Some Practical Experience.- POSSET – Policy-Driven Secure Session Transfer.- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach.- Robust Routing in Malicious Environment for Ad Hoc Networks.- Cryptographic Techniques I.- Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation.- Tracing Traitors by Guessing Secrets. The q-Ary Case.- Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications.- Countermeasures for Preventing Comb Method Against SCA Attacks.- Secure Architecture I.- An Email Worm Vaccine Architecture.- Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.- Security On-demand Architecture with Multiple Modules Support.- Measuring Resistance to Social Engineering.- Access Control.- Conformance Checking of RBAC Policy and its Implementation.- A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications.- A Task-Oriented Access Control Model for WfMS.- Intrusion Detection.- A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection.- Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.- Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.- Model Redundancy vs. Intrusion Detection.- Applications and Case Studies.- An Open Approach for Designing Secure Electronic Immobilizers.- An Empirical Study on the Usability of Logout in a Single Sign-on System.- Secure Software Delivery and Installation in Embedded Systems.- A Restricted Multi-show Credential System and Its Application on E-Voting.- Secure ArchitectureII.- Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks.- Using Trust for Restricted Delegation in Grid Environments.- Computer Vulnerability Evaluation Using Fault Tree Analysis.- An Identity-Based Grid Security Infrastructure Model.- Data Security.- Towards Multilateral-Secure DRM Platforms.- Hiding Data in Binary Images.- Performance Analysis of CDMA-Based Watermarking with Quantization Scheme.- Protecting Mass Data Basing on Small Trusted Agent.- Cryptographic Techniques II.- On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes.- Token-Controlled Public Key Encryption.- A New Class of Codes for Fingerprinting Schemes.- t-Out-of-n String/Bit Oblivious Transfers Revisited.Outros livros adicionais, que poderiam ser muito similares com este livro:
Último livro semelhante:
9783030932060 Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings Robert Deng (50-99.99)
- 9783030932060 Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings Robert Deng (50-99.99)
- 9783030932053 Information Security Practice and Experience (Robert Deng)
- 9783031212796 Information Security Practice and Experience (Chunhua Su; Dimitris Gritzalis; Vincenzo Piuri)
- 9783030343385 Information Security Practice and Experience (Swee-Huay Heng; Javier Lopez)
- 9783030343392 Information Security Practice and Experience (Swee-Huay Heng; Javier Lopez)
< Para arquivar...