Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings R. Sekar (u. a.) Taschenbuch Lecture Notes in Computer Science 2008 - Livro de bolso
2008, ISBN: 9783540898610
[ED: Taschenbuch], [PU: Springer Berlin], This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad… mais…
booklooker.de |
2008, ISBN: 9783540898610
[ED: Softcover], [PU: Springer, Berlin], This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad,… mais…
booklooker.de buecher.de GmbH & Co. KG Custos de envio:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Details... |
2008, ISBN: 3540898611
[EAN: 9783540898610], Neubuch, [PU: Springer-Verlag Gmbh Nov 2008], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / DATENSICHERHEIT, Neuware - This book constitutes the refereed proceedings… mais…
AbeBooks.de Rheinberg-Buch, Bergisch Gladbach, Germany [53870650] [Rating: 5 (von 5)] NEW BOOK. Custos de envio:Versandkostenfrei. (EUR 0.00) Details... |
2001, ISBN: 9783540898610
[ED: Taschenbuch], [PU: Springer-Verlag GmbH], Neuware - This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, he… mais…
booklooker.de buchversandmimpf2000 Custos de envio:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Details... |
2008, ISBN: 9783540898610
Information Systems Security ab 74.99 € als Taschenbuch: 4th International Conference ICISS 2008 Hyderabad India December 16-20 2008 Proceedings. Auflage 2008. Aus dem Bereich: Bücher, Ra… mais…
Hugendubel.de Custos de envio:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00) Details... |
Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings R. Sekar (u. a.) Taschenbuch Lecture Notes in Computer Science 2008 - Livro de bolso
2008, ISBN: 9783540898610
[ED: Taschenbuch], [PU: Springer Berlin], This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad… mais…
2008, ISBN: 9783540898610
[ED: Softcover], [PU: Springer, Berlin], This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad,… mais…
2008
ISBN: 3540898611
[EAN: 9783540898610], Neubuch, [PU: Springer-Verlag Gmbh Nov 2008], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / DATENSICHERHEIT, Neuware - This book constitutes the refereed proceedings… mais…
2001, ISBN: 9783540898610
[ED: Taschenbuch], [PU: Springer-Verlag GmbH], Neuware - This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, he… mais…
2008, ISBN: 9783540898610
Information Systems Security ab 74.99 € als Taschenbuch: 4th International Conference ICISS 2008 Hyderabad India December 16-20 2008 Proceedings. Auflage 2008. Aus dem Bereich: Bücher, Ra… mais…
Dados bibliográficos do melhor livro correspondente
Autor: | |
Título: | |
Número ISBN: |
Dados detalhados do livro - Information Systems Security
EAN (ISBN-13): 9783540898610
ISBN (ISBN-10): 3540898611
Livro de capa dura
Livro de bolso
Ano de publicação: 2008
Editor/Editora: Springer Berlin Heidelberg
307 Páginas
Peso: 0,487 kg
Língua: eng/Englisch
Livro na base de dados desde 2007-09-04T22:08:56-03:00 (Sao Paulo)
Página de detalhes modificada pela última vez em 2023-03-09T13:21:33-03:00 (Sao Paulo)
Número ISBN/EAN: 3540898611
Número ISBN - Ortografia alternativa:
3-540-89861-1, 978-3-540-89861-0
Ortografia alternativa e termos de pesquisa relacionados:
Título do livro: information security, international conference computer science, hyderabad, proceedings all india, lecture notes computer science
Dados da editora
Autor: R. Sekar; Arun K. Pujari
Título: Lecture Notes in Computer Science; Security and Cryptology; Information Systems Security - 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings
Editora: Springer; Springer Berlin
307 Páginas
Ano de publicação: 2008-11-24
Berlin; Heidelberg; DE
Língua: Inglês
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 307 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Computersicherheit; Verstehen; Informatik; biometric; bluetooth security; complexity; computer security; decidability; model checking; privacy; secure voting; security; service-oriented computing; Data and Information Security; Computer Communication Networks; Information Storage and Retrieval; IT Operations; Biometrics; Cryptology; Netzwerksicherheit; Netzwerk-Hardware; Informationsrückgewinnung, Information Retrieval; Data Warehousing; Wirtschaftsmathematik und -informatik, IT-Management; Mustererkennung; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; EA
Keynote Address.- BitBlaze: A New Approach to Computer Security via Binary Analysis.- Languages and Formal Methods.- On the Decidability of Model-Checking Information Flow Properties.- Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties.- Implicit Flows: Can’t Live with ‘Em, Can’t Live without ‘Em.- Protocols.- A Robust Reputation Scheme for Decentralized Group Management Systems.- Complexity of Checking Freshness of Cryptographic Protocols.- Secure Internet Voting Based on Paper Ballots.- Short Papers.- A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper).- A Framework for Trustworthy Service-Oriented Computing (Short Paper).- Revisiting Bluetooth Security (Short Paper).- A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper).- Keynote Address.- Computing on Encrypted Data.- Ongoing Research.- Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators.- Proxy Re-signature Schemes.- Keynote Address.- Fast Signature Matching Using Extended Finite Automaton (XFA).- Intrusion Detection.- Real-Time Alert Correlation with Type Graphs.- Incorporation of Application Layer Protocol Syntax into Anomaly Detection.- A Parallel Architecture for Stateful, High-Speed Intrusion Detection.- Biometrics, Forensics and Steganography.- Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion.- Audio Watermarking Based on Quantization in Wavelet Domain.- Overwriting Hard Drive Data: The Great Wiping Controversy.- Practical Applications.- Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks.- Privacy Management for Facebook.- HyDRo – Hybrid Development of Roles.- KeynoteAddress.- The Enlightened Era of Enterprise Security (Invited Talk).Outros livros adicionais, que poderiam ser muito similares com este livro:
Último livro semelhante:
9780134647272 Information Systems Security (Fisher Royal, P.,)
< Para arquivar...