Proceedings of the Ifip Tc 11 23rd International Information Security Conference / Ifip 20th World Computer Congress, Ifip Sec'08, September 7-10, 2008, Milano, Italy / Sushil Jajodia (u. a.) / Buch - gebunden oder broschiert
2008, ISBN: 9780387096988
[ED: Gebunden], [PU: Springer US], International Federation for Information ProcessingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information an… Mehr…
booklooker.de |
2008, ISBN: 9780387096988
International Federation for Information ProcessingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the s… Mehr…
BarnesandNoble.com new in stock. Versandkosten:zzgl. Versandkosten. Details... |
Proceedings of the IFIP TC 11 23rd International Information Security Conference - gebunden oder broschiert
2008, ISBN: 0387096981
[EAN: 9780387096988], New book, [SC: 15.33], [PU: Springer US], MEDICAL NURSING COMPUTERS INFORMATION TECHNOLOGY SECURITY NETWORKING ONCOLOGY MEDIZIN KLINISCHE FÄCHER ASTRA ANTI-PHISHING … Mehr…
AbeBooks.co.uk |
Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP Sec'08, September 7-10, 2008 - neues Buch
2008, ISBN: 9780387096988
Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP Sec'08, September 7-10, 2008, Milano, Italy Hardcover New Books,… Mehr…
Knetbooks.com new in stock. Versandkosten:plus shipping costs., zzgl. Versandkosten Details... |
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE - gebunden oder broschiert
2008, ISBN: 9780387096988
Springer, 2008. 1st. Hardcover. New/New., Springer, 2008, 6
Biblio.co.uk |
Proceedings of the Ifip Tc 11 23rd International Information Security Conference / Ifip 20th World Computer Congress, Ifip Sec'08, September 7-10, 2008, Milano, Italy / Sushil Jajodia (u. a.) / Buch - gebunden oder broschiert
2008, ISBN: 9780387096988
[ED: Gebunden], [PU: Springer US], International Federation for Information ProcessingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information an… Mehr…
2008, ISBN: 9780387096988
International Federation for Information ProcessingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the s… Mehr…
Proceedings of the IFIP TC 11 23rd International Information Security Conference - gebunden oder broschiert
2008
ISBN: 0387096981
[EAN: 9780387096988], New book, [SC: 15.33], [PU: Springer US], MEDICAL NURSING COMPUTERS INFORMATION TECHNOLOGY SECURITY NETWORKING ONCOLOGY MEDIZIN KLINISCHE FÄCHER ASTRA ANTI-PHISHING … Mehr…
Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP Sec'08, September 7-10, 2008 - neues Buch
2008, ISBN: 9780387096988
Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP Sec'08, September 7-10, 2008, Milano, Italy Hardcover New Books,… Mehr…
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE - gebunden oder broschiert
2008, ISBN: 9780387096988
Springer, 2008. 1st. Hardcover. New/New., Springer, 2008, 6
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008
EAN (ISBN-13): 9780387096988
ISBN (ISBN-10): 0387096981
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2008
Herausgeber: Springer US Core >2 >T
738 Seiten
Gewicht: 1,225 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2008-08-05T13:32:37+02:00 (Berlin)
Detailseite zuletzt geändert am 2024-02-19T21:03:00+01:00 (Berlin)
ISBN/EAN: 9780387096988
ISBN - alternative Schreibweisen:
0-387-09698-1, 978-0-387-09698-8
Alternative Schreibweisen und verwandte Suchbegriffe:
Titel des Buches: proceedings international conference, milano, ifip, information security, the world conference, september, 2008, the 23rd, the congress the world, italy from above, sec, world computer
Daten vom Verlag:
Autor/in: Sushil Jajodia; Pierangela Samarati; Stelvio Cimato
Titel: IFIP Advances in Information and Communication Technology; Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy
Verlag: Springer; Springer US
738 Seiten
Erscheinungsjahr: 2008-07-30
New York; NY; US
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
160,49 € (DE)
164,99 € (AT)
177,00 CHF (CH)
POD
XVIII, 738 p.
BB; Hardcover, Softcover / Medizin/Klinische Fächer; Onkologie; Verstehen; ASTRA; Anti-phishing; HoneyID; Malware; YASIR; data security; fuzzy model; information processing; information security; optimization; smart card; Oncology; Computer Science; Computer Communication Networks; Data and Information Security; Legal Aspects of Computing; IT Operations; Informatik; Netzwerk-Hardware; Computersicherheit; Netzwerksicherheit; Digital- und Informationstechnologien: Rechtliche Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; BC
Hiding in Groups: On the Expressiveness of Privacy Distributions.- Practical Privacy-Preserving Benchmarking.- Enhancing Privacy in Remote Data Classification.- Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators.- Robbing Banks with Their Own Software—an Exploit Against Norwegian Online Banks.- Collaborative architecture for malware detection and analysis.- Realizing Stateful Public Key Encryption in Wireless Sensor Network.- Establishing secure links in low-rate wireless personal area networks.- An Asynchronous Node Replication Attack in Wireless Sensor Networks.- A B Formal Framework for Security Developments in the Domain of Smart Card Applications.- An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies.- Negotiation of Prohibition: An Approach Based on Policy Rewriting.- An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations.- Role Signatures for Access Control in Open Distributed Systems.- Policies and Security Aspects For Distributed Scientific Laboratories.- A Fuzzy Model for the Composition of Intrusion Detectors.- Investigating the problem of IDS false alarms: An experimental study using Snort.- User Session Modeling for Effective Application Intrusion Detection.- A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems.- Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs.- Behavioral Intrusion Detection Indicators.- Leveraging Lattices to Improve Role Mining.- A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases.- Efficient Coalition Detection in Traitor Tracing.- SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned.-Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models.- A Decentralized Bayesian Attack Detection Algorithm for Network Security.- An Operation-Based Metric for CPA Resistance.- YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems.- Adversary Modeling and Simulation in Cyber Warfare.- Interactive Selection of ISO 27001 Controls under Multiple Objectives.- Feasibility of Automated Information Security Compliance Auditing.- Software Licence Protection and Management for Organisations.- A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach.- ASTRA : A Security Analysis Method Based on Asset Tracking.- A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack.- Portable User-Centric Identity Management.- Ubiquitous Privacy-Preserving Identity Managment.- Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data.- Using Virtualization to Create and Deploy Computer Security Lab Exercises.- DigForNet: Digital Forensic in Networking.- A Live Digital Forensic system for Windows networks.- HoneyID : Unveiling Hidden Spywares by Generating Bogus Events.- A Security Protocol for Self-Organizing Data Storage.- Protecting Financial Institutions from Brute-Force Attacks.- Agency Theory: Can it be Used to Strengthen IT Governance?.- A new Accounting Mechanism for Modern and Future AAA Services.- A user survey on the sense of security, Anshin.- Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks.- A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection.- Managing the lifecycle of XACML delegation policies in federated environments.- Assessing the Likelihood of Privacy Policy Compliance.- Classification features for detecting Server-side and Client-side Web attacks.Peer-reviewed and carefully selected Much information in this series is published in advance of journal publication The contributors in this volume are world-renowned experts in their field
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783030417017 Information Security Theory and Practice (Maryline Laurent; Thanassis Giannetsos)
- 9783030417017 Information Security Theory and Practice (Maryline Laurent; Thanassis Giannetsos)
- 9780387096995 Proceedings of the IFIP TC 11 23rd International Information Security Conference (Stelvio Cimato; Sushil Jajodia; Pierangela Samarati)
- 9781441935205 Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, (Sushil Jajodia (Editor), Pierangela Samarati (Editor), Stelvio Cimato (Editor))
- 9780387561462 Proceedings of the Ifip Tc 11 23rd International Information Security Conference (H. J. Bullinger)
- 9780444817488 Computer Security: Proceedings of the IFIP TC11 Ninth International Conference on Information Security, IFIP/Sec 93, Toronto, Canada, 12-14 May 1993 (Ifip Trans) (E.G. Dougall)
< zum Archiv...