From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday: Lecture Notes in Computer Science, cartea 11170
Editat de Pierangela Samarati, Indrajit Ray, Indrakshi Rayen Limba Engleză Paperback – 30 noi 2018
The research areas presented in this Festschrift include membrane computing, spiking neural networks, phylogenetic networks, ant colonies optimization, work bench for bio-computing, reactionsystems, entropy of computation, rewriting systems, and insertion-deletion systems.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 390.18 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 461.77 lei - 20%
Preț: 527.36 lei - 20%
Preț: 497.04 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 391.14 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.72 lei - 20%
Preț: 461.06 lei - 20%
Preț: 390.69 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 390.35 lei - 20%
Preț: 391.20 lei - 20%
Preț: 392.64 lei - 20%
Preț: 389.90 lei - 20%
Preț: 639.72 lei - 20%
Preț: 461.65 lei - 20%
Preț: 462.05 lei - 15%
Preț: 388.50 lei - 5%
Preț: 516.27 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 535.77 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 400.17 lei - 20%
Preț: 403.00 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 329.41 lei
Preț vechi: 411.77 lei
-20% Nou
Puncte Express: 494
Preț estimativ în valută:
58.28€ • 67.90$ • 50.89£
58.28€ • 67.90$ • 50.89£
Carte tipărită la comandă
Livrare economică 19 ianuarie-02 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030048334
ISBN-10: 3030048330
Pagini: 488
Ilustrații: XII, 487 p. 147 illus., 98 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.69 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030048330
Pagini: 488
Ilustrații: XII, 487 p. 147 illus., 98 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.69 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field.- Policy Engineering in RBAC and ABAC.- Comprehensive Security Assurance Measures for Virtualized Server Environments.- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty.- Asymptotic Behavior of Attack Graph Games.- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything.- Protecting Resources and Regulating Access in Cloud-based Object Storage.- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations.- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives.- Access Privacy in the Cloud.- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center.- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers.- Supporting Users in Cloud Plan Selection.- Distributed Services Attestation in IoT.- Exploiting Data Sensitivity on PartitionedData.- A Review of Graph Approaches to Network Security Analytics.- Advanced Biometric Technologies: Emerging Scenarios and Research Trends.- Attribute-Based Encryption: Applications and Future Directions.- Static Analysis for Security Vetting of Android Apps.- Breaking Bad: Forecasting Adversarial Android Bad Behavior.- Bot or Human? A Behavior-based Online Bot Detection System.- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks.- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation.
Caracteristici
Honorary volume dedicated to Sushil Jajodia on occasion to his 70 birthday Written by well-known experts Features the broad range of Sushil Jajodia's research topics