2005, ISBN: 9783540255840
[ED: Taschenbuch], [PU: Springer Berlin Heidelberg], Neuware - The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. A… Meer...
booklooker.de |
Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings - nieuw boek
2005, ISBN: 3540255842
2005 Kartoniert / Broschiert Informationstechnologie, IT, Technologie / Informationstechnologie, Internet / Protokolle, Sicherheit, Technik, Wirtschaftsmathematik und -informatik, IT-Ma… Meer...
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Verzendingskosten:Geen versendingskosten in Duitsland. (EUR 0.00) Details... |
Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings - nieuw boek
2005, ISBN: 3540255842
2005 Kartoniert / Broschiert Informationstechnologie, IT, Technologie / Informationstechnologie, Internet / Protokolle, Sicherheit, Technik, Wirtschaftsmathematik und -informatik, IT-Ma… Meer...
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Verzendingskosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
2005, ISBN: 9783540255840
Editor: Deng, Robert H. Editor: Bao, Feng, Editor: Pang, HweeHwa, Editor: Zhou, Jianying, Springer, Paperback, Auflage: 2005, 440 Seiten, Publiziert: 2005-04-05T00:00:01Z, Produktgruppe: … Meer...
amazon.co.uk BOOKS etc Gebraucht, wie neu. Verzendingskosten:Usually dispatched within 13 to 14 days. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 5.61) Details... |
Information Security Practice and Experience : First International Conference; ISPEC 2005; Singapore; April 11-14; 2005; Proceedings - pocketboek
2005, ISBN: 3540255842
[EAN: 9783540255840], Neubuch, [PU: Springer], PRINT ON DEMAND Book; New; Fast Shipping from the UK., Books
AbeBooks.de Ria Christie Collections, Uxbridge, United Kingdom [59718070] [Rating: 5 (von 5)] NEW BOOK. Verzendingskosten: EUR 1.74 Details... |
2005, ISBN: 9783540255840
[ED: Taschenbuch], [PU: Springer Berlin Heidelberg], Neuware - The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. A… Meer...
Deng, Robert H. (Herausgeber); Zhou, Jianying (Herausgeber); Pang, Hweehwa (Herausgeber); Bao, Feng (Herausgeber):
Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings - nieuw boek2005, ISBN: 3540255842
2005 Kartoniert / Broschiert Informationstechnologie, IT, Technologie / Informationstechnologie, Internet / Protokolle, Sicherheit, Technik, Wirtschaftsmathematik und -informatik, IT-Ma… Meer...
Information Security Practice and Experience First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings - nieuw boek
2005
ISBN: 3540255842
2005 Kartoniert / Broschiert Informationstechnologie, IT, Technologie / Informationstechnologie, Internet / Protokolle, Sicherheit, Technik, Wirtschaftsmathematik und -informatik, IT-Ma… Meer...
2005, ISBN: 9783540255840
Editor: Deng, Robert H. Editor: Bao, Feng, Editor: Pang, HweeHwa, Editor: Zhou, Jianying, Springer, Paperback, Auflage: 2005, 440 Seiten, Publiziert: 2005-04-05T00:00:01Z, Produktgruppe: … Meer...
Information Security Practice and Experience : First International Conference; ISPEC 2005; Singapore; April 11-14; 2005; Proceedings - pocketboek
2005, ISBN: 3540255842
[EAN: 9783540255840], Neubuch, [PU: Springer], PRINT ON DEMAND Book; New; Fast Shipping from the UK., Books
Bibliografische gegevens van het best passende boek
auteur: | |
Titel: | |
ISBN: |
Gedetalleerde informatie over het boek. - Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings: 3439 (Lecture Notes in Computer Science, 3439)
EAN (ISBN-13): 9783540255840
ISBN (ISBN-10): 3540255842
pocket book
Verschijningsjaar: 2005
Uitgever: Springer
440 Bladzijden
Gewicht: 0,661 kg
Taal: eng/Englisch
Boek bevindt zich in het datenbestand sinds 2008-02-12T00:55:12+01:00 (Amsterdam)
Detailpagina laatst gewijzigd op 2024-02-26T12:09:58+01:00 (Amsterdam)
ISBN/EAN: 3540255842
ISBN - alternatieve schrijfwijzen:
3-540-25584-2, 978-3-540-25584-0
alternatieve schrijfwijzen en verwante zoekwoorden:
Auteur van het boek: feng, bäö, may pang, zhou
Titel van het boek: computer security, information security practice experience, security first, proceedings, security 2005, the singapore experience
Gegevens van de uitgever
Auteur: Robert H. Deng; Feng Bao; HweeHwa Pang; Jianying Zhou
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings
Uitgeverij: Springer; Springer Berlin
428 Bladzijden
Verschijningsjaar: 2005-04-05
Berlin; Heidelberg; DE
Taal: Engels
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XII, 428 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; DRM; Denial of Service; Information; Routing; Session; authentication; information security; installatioin; intrusion detection; network security; oblivious transfer; secure communications; security; systems security; trust; Cryptology; Computer Communication Networks; Operating Systems; Computers and Society; IT Operations; Information Storage and Retrieval; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Betriebssysteme; Digital- und Informationstechnologien: soziale und ethische Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; Informationsrückgewinnung, Information Retrieval; Data Warehousing; EA
Network Security.- Risk Assessment of Production Networks Using Honeynets – Some Practical Experience.- POSSET – Policy-Driven Secure Session Transfer.- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach.- Robust Routing in Malicious Environment for Ad Hoc Networks.- Cryptographic Techniques I.- Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation.- Tracing Traitors by Guessing Secrets. The q-Ary Case.- Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications.- Countermeasures for Preventing Comb Method Against SCA Attacks.- Secure Architecture I.- An Email Worm Vaccine Architecture.- Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.- Security On-demand Architecture with Multiple Modules Support.- Measuring Resistance to Social Engineering.- Access Control.- Conformance Checking of RBAC Policy and its Implementation.- A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications.- A Task-Oriented Access Control Model for WfMS.- Intrusion Detection.- A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection.- Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.- Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.- Model Redundancy vs. Intrusion Detection.- Applications and Case Studies.- An Open Approach for Designing Secure Electronic Immobilizers.- An Empirical Study on the Usability of Logout in a Single Sign-on System.- Secure Software Delivery and Installation in Embedded Systems.- A Restricted Multi-show Credential System and Its Application on E-Voting.- Secure ArchitectureII.- Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks.- Using Trust for Restricted Delegation in Grid Environments.- Computer Vulnerability Evaluation Using Fault Tree Analysis.- An Identity-Based Grid Security Infrastructure Model.- Data Security.- Towards Multilateral-Secure DRM Platforms.- Hiding Data in Binary Images.- Performance Analysis of CDMA-Based Watermarking with Quantization Scheme.- Protecting Mass Data Basing on Small Trusted Agent.- Cryptographic Techniques II.- On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes.- Token-Controlled Public Key Encryption.- A New Class of Codes for Fingerprinting Schemes.- t-Out-of-n String/Bit Oblivious Transfers Revisited.Andere boeken die eventueel grote overeenkomsten met dit boek kunnen hebben:
Laatste soortgelijke boek:
9783030932060 Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings Robert Deng (50-99.99)
- 9783030932060 Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings Robert Deng (50-99.99)
- 9783030932053 Information Security Practice and Experience (Robert Deng)
- 9783031212796 Information Security Practice and Experience (Chunhua Su; Dimitris Gritzalis; Vincenzo Piuri)
- 9783030343385 Information Security Practice and Experience (Swee-Huay Heng; Javier Lopez)
- 9783030343392 Information Security Practice and Experience (Swee-Huay Heng; Javier Lopez)
< naar Archief...