Database and Application Security XV: IFIP Advances in Information and Communication Technology, cartea 87
Editat de Martin S. Olivier, David L. Spooneren Limba Engleză Paperback – 12 dec 2012
This volume covers a wide variety of topics related to security and privacy of information in systems and applications, including:
- Access control models;
- Role and constraint-based access control;
- Distributed systems;
- Information warfare and intrusion detection;
- Relational databases;
- Implementation issues;
- Multilevel systems;
- New application areas including XML.
Din seria IFIP Advances in Information and Communication Technology
- 20%
Preț: 334.13 lei -
Preț: 382.30 lei - 20%
Preț: 323.23 lei - 20%
Preț: 329.80 lei - 20%
Preț: 544.99 lei - 20%
Preț: 438.53 lei - 15%
Preț: 624.01 lei - 20%
Preț: 1122.44 lei - 20%
Preț: 523.54 lei - 18%
Preț: 914.16 lei - 20%
Preț: 1259.11 lei - 20%
Preț: 694.32 lei - 20%
Preț: 1387.21 lei - 20%
Preț: 511.28 lei - 20%
Preț: 752.82 lei - 20%
Preț: 753.04 lei - 18%
Preț: 1184.70 lei - 20%
Preț: 1246.15 lei - 20%
Preț: 1256.72 lei - 18%
Preț: 920.96 lei - 33%
Preț: 535.48 lei - 20%
Preț: 632.01 lei - 15%
Preț: 627.39 lei - 20%
Preț: 968.39 lei - 15%
Preț: 625.33 lei - 20%
Preț: 970.44 lei - 20%
Preț: 630.06 lei - 20%
Preț: 1235.50 lei - 20%
Preț: 1247.98 lei - 18%
Preț: 1193.24 lei - 20%
Preț: 1251.13 lei - 18%
Preț: 911.42 lei - 20%
Preț: 1240.76 lei - 18%
Preț: 1198.80 lei - 20%
Preț: 969.20 lei - 18%
Preț: 1189.45 lei - 20%
Preț: 1251.50 lei - 18%
Preț: 929.48 lei - 20%
Preț: 1250.27 lei - 20%
Preț: 1249.03 lei - 20%
Preț: 964.45 lei - 18%
Preț: 925.91 lei - 20%
Preț: 955.16 lei - 18%
Preț: 913.86 lei - 20%
Preț: 1247.77 lei - 18%
Preț: 1194.20 lei - 18%
Preț: 1202.36 lei - 20%
Preț: 964.61 lei
Preț: 634.21 lei
Preț vechi: 792.76 lei
-20%
Puncte Express: 951
Carte tipărită la comandă
Livrare economică 04-18 iulie
Specificații
ISBN-13: 9781475710281
ISBN-10: 1475710283
Pagini: 348
Ilustrații: XII, 340 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.53 kg
Ediția:Softcover reprint of the original 1st ed. 2002
Editura: Springer
Colecția IFIP Advances in Information and Communication Technology
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
ISBN-10: 1475710283
Pagini: 348
Ilustrații: XII, 340 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.53 kg
Ediția:Softcover reprint of the original 1st ed. 2002
Editura: Springer
Colecția IFIP Advances in Information and Communication Technology
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
I Keynote address.- Recent Advances in Access Control Models.- II Role and Constraint-Based Access Control.- Role-based Access Control on the Web Using LDAP.- Constraints-based Access Control.- Secure Role-Based Workflow Models.- III Distributed Systems.- Subject Switching Algorithms for Access Control in Federated Databases.- Efficient Damage Assessment and Repair in Resilient Distributed Database Systems.- Administering Permissions for Distributed Data: Factoring and Automated Inference.- State-Dependent Security Decisions for Distributed Object-Systems.- IV Information Warfare and Intrusion Detection.- Reorganization of Database Log for Information Warfare Data Recovery.- Randomly roving agents for intrusion detection.- Public Telephone Network Vulnerabilities.- V Relational Databases.- Flexible Security Policies in SQL.- The Inference Problem and Updates in Relational Databases.- Managing Classified Documents in a Relational Database.- VI Implementation Issues.- A Comparison Between ConSA and Current Linux Security Implementations.- A Novel Approach to Certificate Revocation Management.- ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications.- VII Multilevel Systems.- An Extended Transaction Model Approach for Multilevel Secure Transaction Processing.- Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System.- VIII New Application Areas.- Security Procedures for Classification Mining Algorithms.- Regulating Access to XML documents.- IX Panel and discussion.- Panel on XML and Security.- Selected Summary of Discussions.