- 5 Ergebnisse
Kleinster Preis: € 68,06, größter Preis: € 266,32, Mittelwert: € 158,16
1
Proceedings of the Ifip Tc 11 23rd International Information Security Conference / Ifip 20th World Computer Congress, Ifip Sec'08, September 7-10, 2008, Milano, Italy / Sushil Jajodia (u. a.) / Buch - Jajodia, Sushil
Bestellen
bei booklooker.de
€ 144,74
Versand: € 0,001
Bestellengesponserter Link
Jajodia, Sushil:

Proceedings of the Ifip Tc 11 23rd International Information Security Conference / Ifip 20th World Computer Congress, Ifip Sec'08, September 7-10, 2008, Milano, Italy / Sushil Jajodia (u. a.) / Buch - gebunden oder broschiert

2008, ISBN: 9780387096988

[ED: Gebunden], [PU: Springer US], International Federation for Information ProcessingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information an… Mehr…

Versandkosten:Versandkostenfrei. (EUR 0.00) Buchbär
2
Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008
Bestellen
bei BarnesandNoble.com
€ 169,99
Bestellengesponserter Link
Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008 - neues Buch

2008, ISBN: 9780387096988

International Federation for Information ProcessingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the s… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten.
3
Proceedings of the IFIP TC 11 23rd International Information Security Conference - Jajodia, Sushil|Samarati, Pierangela|Cimato, Stelvio
Bestellen
bei AbeBooks.co.uk
£ 123,83
(ca. € 141,69)
Versand: € 15,331
Bestellengesponserter Link
Jajodia, Sushil|Samarati, Pierangela|Cimato, Stelvio:
Proceedings of the IFIP TC 11 23rd International Information Security Conference - gebunden oder broschiert

2008

ISBN: 0387096981

[EAN: 9780387096988], New book, [SC: 15.33], [PU: Springer US], MEDICAL NURSING COMPUTERS INFORMATION TECHNOLOGY SECURITY NETWORKING ONCOLOGY MEDIZIN KLINISCHE FÄCHER ASTRA ANTI-PHISHING … Mehr…

NEW BOOK. Versandkosten: EUR 15.33 moluna, Greven, Germany [73551232] [Rating: 4 (of 5)]
4
Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP Sec'08, September 7-10, 2008 - Jajodia, Sushil
Bestellen
bei Knetbooks.com
€ 266,32
Bestellengesponserter Link
Jajodia, Sushil:
Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP Sec'08, September 7-10, 2008 - neues Buch

2008, ISBN: 9780387096988

Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP Sec'08, September 7-10, 2008, Milano, Italy Hardcover New Books,… Mehr…

new in stock. Versandkosten:plus shipping costs., zzgl. Versandkosten
5
Bestellen
bei Biblio.co.uk
$ 74,00
(ca. € 68,06)
Versand: € 9,201
Bestellengesponserter Link
JAJODIA, SUSHIL; SAMARATI, PIERANGELA; CIMATO, STELVIO,:
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE - gebunden oder broschiert

2008, ISBN: 9780387096988

Springer, 2008. 1st. Hardcover. New/New., Springer, 2008, 6

IND - IndienVersandkosten: EUR 9.20 DELHI BOOK STORE

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch
Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008

This book constitutes the refereed proceedings of the IFIP TC 11 23rd Information Security Conference held in Italy on September 7-10, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Detailangaben zum Buch - Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008


EAN (ISBN-13): 9780387096988
ISBN (ISBN-10): 0387096981
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2008
Herausgeber: Springer US Core >2 >T
738 Seiten
Gewicht: 1,225 kg
Sprache: eng/Englisch

Buch in der Datenbank seit 2008-08-05T13:32:37+02:00 (Berlin)
Detailseite zuletzt geändert am 2024-02-19T21:03:00+01:00 (Berlin)
ISBN/EAN: 9780387096988

ISBN - alternative Schreibweisen:
0-387-09698-1, 978-0-387-09698-8
Alternative Schreibweisen und verwandte Suchbegriffe:
Titel des Buches: proceedings international conference, milano, ifip, information security, the world conference, september, 2008, the 23rd, the congress the world, italy from above, sec, world computer


Daten vom Verlag:

Autor/in: Sushil Jajodia; Pierangela Samarati; Stelvio Cimato
Titel: IFIP Advances in Information and Communication Technology; Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy
Verlag: Springer; Springer US
738 Seiten
Erscheinungsjahr: 2008-07-30
New York; NY; US
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
160,49 € (DE)
164,99 € (AT)
177,00 CHF (CH)
POD
XVIII, 738 p.

BB; Hardcover, Softcover / Medizin/Klinische Fächer; Onkologie; Verstehen; ASTRA; Anti-phishing; HoneyID; Malware; YASIR; data security; fuzzy model; information processing; information security; optimization; smart card; Oncology; Computer Science; Computer Communication Networks; Data and Information Security; Legal Aspects of Computing; IT Operations; Informatik; Netzwerk-Hardware; Computersicherheit; Netzwerksicherheit; Digital- und Informationstechnologien: Rechtliche Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; BC

Hiding in Groups: On the Expressiveness of Privacy Distributions.- Practical Privacy-Preserving Benchmarking.- Enhancing Privacy in Remote Data Classification.- Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators.- Robbing Banks with Their Own Software—an Exploit Against Norwegian Online Banks.- Collaborative architecture for malware detection and analysis.- Realizing Stateful Public Key Encryption in Wireless Sensor Network.- Establishing secure links in low-rate wireless personal area networks.- An Asynchronous Node Replication Attack in Wireless Sensor Networks.- A B Formal Framework for Security Developments in the Domain of Smart Card Applications.- An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies.- Negotiation of Prohibition: An Approach Based on Policy Rewriting.- An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations.- Role Signatures for Access Control in Open Distributed Systems.- Policies and Security Aspects For Distributed Scientific Laboratories.- A Fuzzy Model for the Composition of Intrusion Detectors.- Investigating the problem of IDS false alarms: An experimental study using Snort.- User Session Modeling for Effective Application Intrusion Detection.- A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems.- Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs.- Behavioral Intrusion Detection Indicators.- Leveraging Lattices to Improve Role Mining.- A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases.- Efficient Coalition Detection in Traitor Tracing.- SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned.-Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models.- A Decentralized Bayesian Attack Detection Algorithm for Network Security.- An Operation-Based Metric for CPA Resistance.- YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems.- Adversary Modeling and Simulation in Cyber Warfare.- Interactive Selection of ISO 27001 Controls under Multiple Objectives.- Feasibility of Automated Information Security Compliance Auditing.- Software Licence Protection and Management for Organisations.- A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach.- ASTRA : A Security Analysis Method Based on Asset Tracking.- A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack.- Portable User-Centric Identity Management.- Ubiquitous Privacy-Preserving Identity Managment.- Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data.- Using Virtualization to Create and Deploy Computer Security Lab Exercises.- DigForNet: Digital Forensic in Networking.- A Live Digital Forensic system for Windows networks.- HoneyID : Unveiling Hidden Spywares by Generating Bogus Events.- A Security Protocol for Self-Organizing Data Storage.- Protecting Financial Institutions from Brute-Force Attacks.- Agency Theory: Can it be Used to Strengthen IT Governance?.- A new Accounting Mechanism for Modern and Future AAA Services.- A user survey on the sense of security, Anshin.- Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks.- A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection.- Managing the lifecycle of XACML delegation policies in federated environments.- Assessing the Likelihood of Privacy Policy Compliance.- Classification features for detecting Server-side and Client-side Web attacks.
Peer-reviewed and carefully selected Much information in this series is published in advance of journal publication The contributors in this volume are world-renowned experts in their field

< zum Archiv...