2007, ISBN: 9783540739852
Kartoniert, 436 Seiten, 235mm x 155mm x 24mm, Sprache(n): eng The refereed proceedings of the Fourth International Conference on Mathematical Methods, Models, and Architectures for Comput… Mehr…
buchfreund.de MARZIES Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
Computer Network Security Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings - neues Buch
2007, ISBN: 3540739858
2007 Kartoniert / Broschiert Datensicherheit / Netz, Computerhardware, Netzwerk-Hardware, Data Mining, Computersicherheit, Netzwerksicherheit, Angewandte Informatik, DOM; Smartcard; acc… Mehr…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
2007, ISBN: 9783540739852
This book constitutes the refereed proceedings of the Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, held… Mehr…
BarnesandNoble.com new in stock. Versandkosten:zzgl. Versandkosten. Details... |
2007, ISBN: 9783540739852
Taschenbuch
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the… Mehr…
booklooker.de |
2007, ISBN: 9783540739852
*Computer Network Security* - Fourth International Conference on Mathematical Methods Models and Architectures for Computer Network Security MMM-ACNS 2007 St. Petersburg Russia September … Mehr…
Hugendubel.de Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00) Details... |
Computer Network Security Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings - neues Buch
2007, ISBN: 9783540739852
Kartoniert, 436 Seiten, 235mm x 155mm x 24mm, Sprache(n): eng The refereed proceedings of the Fourth International Conference on Mathematical Methods, Models, and Architectures for Comput… Mehr…
Gorodetsky, Vladimir (Herausgeber); Skormin, Victor A. (Herausgeber); Kotenko, Igor (Herausgeber):
Computer Network Security Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings - neues Buch2007, ISBN: 3540739858
2007 Kartoniert / Broschiert Datensicherheit / Netz, Computerhardware, Netzwerk-Hardware, Data Mining, Computersicherheit, Netzwerksicherheit, Angewandte Informatik, DOM; Smartcard; acc… Mehr…
2007
ISBN: 9783540739852
This book constitutes the refereed proceedings of the Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, held… Mehr…
2007, ISBN: 9783540739852
Taschenbuch
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the… Mehr…
2007, ISBN: 9783540739852
*Computer Network Security* - Fourth International Conference on Mathematical Methods Models and Architectures for Computer Network Security MMM-ACNS 2007 St. Petersburg Russia September … Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Computer Network Security
EAN (ISBN-13): 9783540739852
ISBN (ISBN-10): 3540739858
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2007
Herausgeber: Springer Berlin Heidelberg
416 Seiten
Gewicht: 0,657 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2007-01-19T15:23:16+01:00 (Zurich)
Detailseite zuletzt geändert am 2024-03-17T09:51:14+01:00 (Zurich)
ISBN/EAN: 9783540739852
ISBN - alternative Schreibweisen:
3-540-73985-8, 978-3-540-73985-2
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: gorodetsky, network security, igor, gorodé, erl vladimir
Titel des Buches: computer security, network security architectures, network science, method architecture, petersburg, information communications security, russia, international conference computer science, mmm, proceedings the fourth conference, models and architecture, mathematical models and methods for
Daten vom Verlag:
Autor/in: Vladimir Gorodetsky; Igor Kotenko; Victor A. Skormin
Titel: Communications in Computer and Information Science; Computer Network Security - Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings
Verlag: Springer; Springer Berlin
418 Seiten
Erscheinungsjahr: 2007-08-28
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 418 p.
BC; Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; Informatik; DOM; Smart Card; access control; algorithms; architecture; authentication; authorizati; data mining; data security; deception systems; network security; networks; organization; pervasive and ubiquitous computing; security; Computer Communication Networks; Data and Information Security; Data Mining and Knowledge Discovery; Computer and Information Systems Applications; Computer Engineering and Networks; Computersicherheit; Netzwerksicherheit; Data Mining; Wissensbasierte Systeme, Expertensysteme; Angewandte Informatik; Computerhardware; EA
Invited Papers.- Surreptitious Software: Models from Biology and History.- Characterizing Software Self-healing Systems.- Assumptions: The Trojan Horses of Secure Protocols.- Smart Cards and Digital Security.- Virus Throttle as Basis for ProActive Defense.- Technologies for Protection Against Insider Attacks on Computer Systems.- Authentication, Authorization and Access Control.- Access Control and Declassification.- Reasoning About Delegation and Account Access in Retail Payment Systems.- Performance Evaluation of Keyless Authentication Based on Noisy Channel.- Avoiding Key Redistribution in Key Assignment Schemes.- Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching.- Class of Provably Secure Information Authentication Systems.- A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems.- Language-Based Security, Trust Management and Covert Channels.- Synthesis of Non-interferent Distributed Systems.- Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems.- Covert Channel Invisibility Theorem.- Security Verification and Evaluation.- Policy-Based Proactive Monitoring of Security Policy Performance.- Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric.- Abstraction Based Verification of a Parameterised Policy Controlled System.- Algebraic Models to Detect and Solve Policy Conflicts.- Event Calcululus Based Checking of Filtering Policies.- A New Approach to Security Evaluation of Operating Systems.- Intrusion Detection and Prevention.- Multi-agent Peer-to-Peer Intrusion Detection.- An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures.- Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response.- Mathematical Models of Intrusion Detection by an Intelligent Immunochip.- A Novel Intrusion Detection System for a Local Computer Network.- Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework.- Host-Based Intrusion Detection System: Model and Design Features.- Network Survivability and Privacy.- Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics.- Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks.- Anycast Communication—A New Approach to Survivability of Connection-Oriented Networks.- Privacy Preserving Context Transfer in All-IP Networks.- Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols.- Watermarking.- A Spatial Watermarking Algorithm for Video Images.- Watermarking Software to Signal Copy Protection.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783319651279 Computer Network Security (Igor Kotenko, Jacek Rak, John Bay, Krzysztof Szczypiorski, Leonard Popyack, Victor Skormin)
- 9783319651279 Computer Network Security (Igor Kotenko, Jacek Rak, John Bay, Krzysztof Szczypiorski, Leonard Popyack, Victor Skormin)
- 9781119706724 Computer Network Security (Ali Sadiqui)
- 9783319651262 Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 201 (Jacek Rak; John Bay; Igor Kotenko; Leonard Popyack; Victor Skormin; Krzysztof Szczypiorski)
- 9783540291138 Computer Network Security (Vladimir Gorodetsky; Igor Kotenko; Victor Skormin)
< zum Archiv...