2003, ISBN: 3540407979
[EAN: 9783540407973], Neubuch, [PU: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, Germany], Computers & the Internet|Computer Science, Computers & the Internet|Networking, Computer… Mehr…
AbeBooks.de The Book Depository EURO, London, United Kingdom [60485773] [Rating: 3 (von 5)] NEW BOOK. Versandkosten: EUR 3.31 Details... |
2003, ISBN: 9783540407973
Kartoniert, 488 Seiten, 235mm x 155mm x 27mm, Sprache(n): eng Includes supplementary material: sn.pub/extrasThis volume contains the papers presented at the International Workshop on Math… Mehr…
buchfreund.de MARZIES Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
Computer Network Security Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings - neues Buch
2003, ISBN: 3540407979
2003 Kartoniert / Broschiert Datensicherheit / Netz, Wirtschaftsmathematik und -informatik, IT-Management, Ethische und soziale Fragen der IT, Netzwerk-Hardware, Betriebssysteme, Krypto… Mehr…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
2003, ISBN: 9783540407973
Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, … Mehr…
lehmanns.de Versandkosten:Versand in 10-14 Tagen. (EUR 0.00) Details... |
ISBN: 9783540407973
There is currently no description available, Springer
Springer.com Nr. 978-3-540-40797-3. Versandkosten:Worldwide free shipping, , zzgl. Versandkosten. (EUR 0.00) Details... |
Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings (Paperback) - Taschenbuch
2003, ISBN: 3540407979
[EAN: 9783540407973], Neubuch, [PU: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, Germany], Computers & the Internet|Computer Science, Computers & the Internet|Networking, Computer… Mehr…
2003, ISBN: 9783540407973
Kartoniert, 488 Seiten, 235mm x 155mm x 27mm, Sprache(n): eng Includes supplementary material: sn.pub/extrasThis volume contains the papers presented at the International Workshop on Math… Mehr…
Computer Network Security Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings - neues Buch
2003
ISBN: 3540407979
2003 Kartoniert / Broschiert Datensicherheit / Netz, Wirtschaftsmathematik und -informatik, IT-Management, Ethische und soziale Fragen der IT, Netzwerk-Hardware, Betriebssysteme, Krypto… Mehr…
2003, ISBN: 9783540407973
Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, … Mehr…
ISBN: 9783540407973
There is currently no description available, Springer
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Computer Network Security
EAN (ISBN-13): 9783540407973
ISBN (ISBN-10): 3540407979
Taschenbuch
Erscheinungsjahr: 2003
Herausgeber: Springer Berlin
488 Seiten
Gewicht: 0,731 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2007-04-18T16:06:14+02:00 (Zurich)
Detailseite zuletzt geändert am 2024-02-19T21:02:54+01:00 (Zurich)
ISBN/EAN: 9783540407973
ISBN - alternative Schreibweisen:
3-540-40797-9, 978-3-540-40797-3
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: gorodetsky, gorodé, victor leon, erl vladimir
Titel des Buches: network security architectures, method architecture, mmm, not architecture, mathematical models and methods for, petersburg, computer security
Daten vom Verlag:
Autor/in: Vladimir Gorodetsky; Leonard Popyack; Victor Skormin
Titel: Lecture Notes in Computer Science; Computer Network Security - Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings
Verlag: Springer; Springer Berlin
478 Seiten
Erscheinungsjahr: 2003-09-09
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 478 p.
BC; Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; access control; authentication; computer network security; computer security; cryptography; data security; information security; intrusion detection; network security; privacy; secure communications; secure networking; security; systems security; Computer Communication Networks; Cryptology; Operating Systems; Computer Application in Administrative Data Processing; Computers and Society; IT Operations; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Betriebssysteme; Computer-Anwendungen in den Sozial- und Verhaltenswissenschaften; Digital- und Informationstechnologien: soziale und ethische Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; EA
Invited Papers.- ForNet: A Distributed Forensics Network.- Usage Control: A Vision for Next Generation Access Control.- Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL.- Complexity Problems in the Analysis of Information Systems Security.- A Behavior-Based Approach to Securing Email Systems.- Real-Time Intrusion Detection with Emphasis on Insider Attacks.- Mathematical Models and Architectures for Computer Network Security.- Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols.- GRID Security Review.- A Knowledge-Based Repository Model for Security Policies Management.- Symbolic Partial Model Checking for Security Analysis.- Rule-Based Systems Security Model.- Logical Resolving for Security Evaluation.- Intrusion Detection.- Enhanced Correlation in an Intrusion Detection Process.- Safeguarding SCADA Systems with Anomaly Detection.- Experiments with Simulation of Attacks against Computer Networks.- Detecting Malicious Codes by the Presence of Their “Gene of Self-replication”.- Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences.- Public Key Distribution, Authentication, Access Control.- Distributed Access Control: A Logic-Based Approach.- Advanced Certificate Status Protocol.- Key History Tree: Efficient Group Key Management with Off-Line Members.- A Certificate Status Checking Protocol for the Authenticated Dictionary.- Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach.- Cryptography.- A Signcryption Scheme Based on Secret Sharing Technique.- A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem.- Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property.-Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper.- On Cipher Design Based on Switchable Controlled Operations.- Elliptic Curve Point Multiplication.- Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation.- Steganography.- Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel.- Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation.- Digital Watermarking under a Filtering and Additive Noise Attack Condition.- Data Hiding in Digital Audio by Frequency Domain Dithering.- Steganography with Least Histogram Abnormality.- Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences.- Short Papers.- Authentication of Anycast Communication.- Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy.- Construction of the Covert Channels.- Privacy and Data Protection in Electronic Communications.- Multiplier for Public-Key Cryptosystem Based on Cellular Automata.- A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols.- Alert Triage on the ROC.- Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64.- Immunocomputing Model of Intrusion Detection.- Agent Platform Security Architecture.- Support Vector Machine Based ICMP Covert Channel Attack Detection.- Computer Immunology System with Variable Configuration.Includes supplementary material: sn.pub/extras
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9781119706724 Computer Network Security (Ali Sadiqui)
- 9781119706724 Computer Network Security (Ali Sadiqui)
- 9783540452157 Computer Network Security (Vladimir Gorodetsky; Leonard Popyack; Victor Skormin)
- 9783540319986 Computer Network Security (Vladimir Gorodetsky; Igor Kotenko; Victor Skormin)
- 9783540291138 Computer Network Security (Vladimir Gorodetsky; Igor Kotenko; Victor Skormin)
< zum Archiv...