- 5 Ergebnisse
Kleinster Preis: € 53,49, größter Preis: € 77,45, Mittelwert: € 60,05
1
Computer Network Security Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings
Bestellen
bei buchfreund.de
€ 58,71
Versand: € 0,001
Bestellengesponserter Link

Computer Network Security Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings - neues Buch

2007, ISBN: 9783540739852

Kartoniert, 436 Seiten, 235mm x 155mm x 24mm, Sprache(n): eng The refereed proceedings of the Fourth International Conference on Mathematical Methods, Models, and Architectures for Comput… Mehr…

Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) MARZIES Buch- und Medienhandel, 14621 Schönwalde-Glien
2
Computer Network Security Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings - Gorodetsky, Vladimir (Herausgeber); Skormin, Victor A. (Herausgeber); Kotenko, Igor (Herausgeber)
Bestellen
bei Achtung-Buecher.de
€ 55,60
Versand: € 0,001
Bestellengesponserter Link

Gorodetsky, Vladimir (Herausgeber); Skormin, Victor A. (Herausgeber); Kotenko, Igor (Herausgeber):

Computer Network Security Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings - neues Buch

2007, ISBN: 3540739858

2007 Kartoniert / Broschiert Datensicherheit / Netz, Computerhardware, Netzwerk-Hardware, Data Mining, Computersicherheit, Netzwerksicherheit, Angewandte Informatik, DOM; Smartcard; acc… Mehr…

Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien
3
Computer Network Security: Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2
Bestellen
bei BarnesandNoble.com
€ 54,99
Bestellengesponserter Link
Computer Network Security: Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2 - neues Buch

2007

ISBN: 9783540739852

This book constitutes the refereed proceedings of the Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, held… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten.
4
Computer Network Security - Gorodetsky, Vladimir Kotenko, Igor Skormin, Victor A.
Bestellen
bei booklooker.de
€ 77,45
Versand: € 0,001
Bestellengesponserter Link
Gorodetsky, Vladimir Kotenko, Igor Skormin, Victor A.:
Computer Network Security - Erstausgabe

2007, ISBN: 9783540739852

Taschenbuch

[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the… Mehr…

Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Moluna GmbH
5
Computer Network Security
Bestellen
bei Hugendubel.de
€ 53,49
Versand: € 0,001
Bestellengesponserter Link
Computer Network Security - Taschenbuch

2007, ISBN: 9783540739852

*Computer Network Security* - Fourth International Conference on Mathematical Methods Models and Architectures for Computer Network Security MMM-ACNS 2007 St. Petersburg Russia September … Mehr…

Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch
Computer Network Security

This book constitutes the refereed proceedings of the Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, held in St. Petersburg, Russia in September 2007. The First, Second and Third International Workshops "Mathematical Methods, Models and Architectures for Computer Networks Security" demonstrated the high interest of the international scientific community to the theoretical aspects of the computer network and information security and the need for conducting of such workshops as on-going series.The proposed MMM-ACNS 2007 conference is intended as a next step in this series and will be focused on theoretical problems in the area under consideration. Its objectives are to bring together leading researchers from academia and governmental organizations as well as practitioners in the area of computer networks and information security, facilitating personal interactions and discussions on various aspects of information technologies in conjunction with computer network and information security problems arising in large-scale computer networks engaged in information storing, transmitting, and processing.

Detailangaben zum Buch - Computer Network Security


EAN (ISBN-13): 9783540739852
ISBN (ISBN-10): 3540739858
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2007
Herausgeber: Springer Berlin Heidelberg
416 Seiten
Gewicht: 0,657 kg
Sprache: eng/Englisch

Buch in der Datenbank seit 2007-01-19T15:23:16+01:00 (Zurich)
Detailseite zuletzt geändert am 2024-03-17T09:51:14+01:00 (Zurich)
ISBN/EAN: 9783540739852

ISBN - alternative Schreibweisen:
3-540-73985-8, 978-3-540-73985-2
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: gorodetsky, network security, igor, gorodé, erl vladimir
Titel des Buches: computer security, network security architectures, network science, method architecture, petersburg, information communications security, russia, international conference computer science, mmm, proceedings the fourth conference, models and architecture, mathematical models and methods for


Daten vom Verlag:

Autor/in: Vladimir Gorodetsky; Igor Kotenko; Victor A. Skormin
Titel: Communications in Computer and Information Science; Computer Network Security - Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings
Verlag: Springer; Springer Berlin
418 Seiten
Erscheinungsjahr: 2007-08-28
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 418 p.

BC; Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; Informatik; DOM; Smart Card; access control; algorithms; architecture; authentication; authorizati; data mining; data security; deception systems; network security; networks; organization; pervasive and ubiquitous computing; security; Computer Communication Networks; Data and Information Security; Data Mining and Knowledge Discovery; Computer and Information Systems Applications; Computer Engineering and Networks; Computersicherheit; Netzwerksicherheit; Data Mining; Wissensbasierte Systeme, Expertensysteme; Angewandte Informatik; Computerhardware; EA

Invited Papers.- Surreptitious Software: Models from Biology and History.- Characterizing Software Self-healing Systems.- Assumptions: The Trojan Horses of Secure Protocols.- Smart Cards and Digital Security.- Virus Throttle as Basis for ProActive Defense.- Technologies for Protection Against Insider Attacks on Computer Systems.- Authentication, Authorization and Access Control.- Access Control and Declassification.- Reasoning About Delegation and Account Access in Retail Payment Systems.- Performance Evaluation of Keyless Authentication Based on Noisy Channel.- Avoiding Key Redistribution in Key Assignment Schemes.- Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching.- Class of Provably Secure Information Authentication Systems.- A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems.- Language-Based Security, Trust Management and Covert Channels.- Synthesis of Non-interferent Distributed Systems.- Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems.- Covert Channel Invisibility Theorem.- Security Verification and Evaluation.- Policy-Based Proactive Monitoring of Security Policy Performance.- Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric.- Abstraction Based Verification of a Parameterised Policy Controlled System.- Algebraic Models to Detect and Solve Policy Conflicts.- Event Calcululus Based Checking of Filtering Policies.- A New Approach to Security Evaluation of Operating Systems.- Intrusion Detection and Prevention.- Multi-agent Peer-to-Peer Intrusion Detection.- An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures.- Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response.- Mathematical Models of Intrusion Detection by an Intelligent Immunochip.- A Novel Intrusion Detection System for a Local Computer Network.- Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework.- Host-Based Intrusion Detection System: Model and Design Features.- Network Survivability and Privacy.- Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics.- Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks.- Anycast Communication—A New Approach to Survivability of Connection-Oriented Networks.- Privacy Preserving Context Transfer in All-IP Networks.- Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols.- Watermarking.- A Spatial Watermarking Algorithm for Video Images.- Watermarking Software to Signal Copy Protection.

< zum Archiv...