Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China: IFIP Advances in Information and Communication Technology, cartea 47
Editat de Sihan Qing, Jan H. P. Eloffen Limba Engleză Paperback – 6 feb 2013
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 1233.02 lei 6-8 săpt. | |
| Springer Us – 6 feb 2013 | 1233.02 lei 6-8 săpt. | |
| Hardback (1) | 1240.75 lei 6-8 săpt. | |
| Springer – 31 iul 2000 | 1240.75 lei 6-8 săpt. |
Din seria IFIP Advances in Information and Communication Technology
- 20%
Preț: 559.95 lei - 20%
Preț: 746.71 lei - 20%
Preț: 555.69 lei - 20%
Preț: 623.07 lei - 20%
Preț: 623.39 lei - 20%
Preț: 327.36 lei -
Preț: 382.30 lei - 20%
Preț: 323.23 lei - 20%
Preț: 327.99 lei - 20%
Preț: 528.48 lei - 15%
Preț: 527.06 lei - 20%
Preț: 527.38 lei - 20%
Preț: 424.44 lei - 15%
Preț: 624.01 lei - 20%
Preț: 1116.37 lei - 18%
Preț: 909.08 lei - 20%
Preț: 1232.88 lei - 20%
Preț: 689.95 lei - 18%
Preț: 911.54 lei - 15%
Preț: 616.15 lei - 18%
Preț: 1216.83 lei - 15%
Preț: 613.18 lei - 15%
Preț: 611.74 lei - 20%
Preț: 957.62 lei - 20%
Preț: 619.71 lei - 15%
Preț: 616.45 lei - 20%
Preț: 944.97 lei - 20%
Preț: 1231.59 lei - 20%
Preț: 1226.84 lei - 20%
Preț: 616.05 lei - 20%
Preț: 1232.08 lei - 20%
Preț: 952.00 lei - 20%
Preț: 1232.88 lei - 18%
Preț: 1183.12 lei - 15%
Preț: 611.23 lei - 18%
Preț: 911.54 lei - 18%
Preț: 1171.97 lei - 20%
Preț: 1848.88 lei - 15%
Preț: 611.23 lei - 18%
Preț: 914.70 lei - 20%
Preț: 968.03 lei - 20%
Preț: 2110.89 lei - 20%
Preț: 1237.63 lei - 20%
Preț: 634.64 lei - 20%
Preț: 623.22 lei - 20%
Preț: 1235.90 lei - 20%
Preț: 1327.97 lei - 18%
Preț: 1180.37 lei - 20%
Preț: 623.18 lei
Preț: 1233.02 lei
Preț vechi: 1541.28 lei
-20% Nou
Puncte Express: 1850
Preț estimativ în valută:
218.24€ • 254.40$ • 190.86£
218.24€ • 254.40$ • 190.86£
Carte tipărită la comandă
Livrare economică 20 ianuarie-03 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781475754797
ISBN-10: 1475754795
Pagini: 528
Ilustrații: XVIII, 514 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.73 kg
Ediția:Softcover reprint of the original 1st ed. 2000
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
ISBN-10: 1475754795
Pagini: 528
Ilustrații: XVIII, 514 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.73 kg
Ediția:Softcover reprint of the original 1st ed. 2000
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
1. IT Security Certification and Criteria.- 2. Information Security: Process Evaluation and Product Evaluation.- 3. Managing Information Security in Healthcare — an Action Research Experience.- 4. From Trusted Information Security Controls to a Trusted Information Security Environment.- 5. A Qualitative Approach to Information Availability.- 6. A Postgraduate Programme on Information and Communication Systems Security.- 7. Information Security Management through Measurement.- 8. The Defense Framework for Large-scale Computer Network System.- 9. Identity Mapping: An Approach to Unravel Enterprise Security Management Policies.- 10. Independent Policy Oriented Layering of Security Services.- 11. Reducing Computer Fraud through Situational Crime Prevention.- 12. Policies for Construction of Information Systems’ Security Guidelines: Five Approaches.- 13. ‘DNA-proofing’ for Computer Systems — A New Approach to Computer Security?.- 14. Using Smart Cards in an Educational Environment: Services and Security Features.- 15. MASS: Model for an Auditing Security System.- 16. Classifying Information for External Release.- 17. Using Mobile Agent Results to Create Hard-To-Detect Computer Viruses.- 18. CARDS: A Distributed System for Detecting Coordinated Attacks.- 19. Robust Audio Watermarking based on Secure Spread Spectrum and Auditory Perception Model.- 20. A Simple and Efficient Approach to Verifying Cryptographic Protocols.- 21. Power Analysis of RC6 and Serpent.- 22. A Simple Algorithm for Computing Several Sequences Synthesis.- 23. GSFS — A New Group-Aware Cryptographic File System.- 24. Robustness-Agile Encryptor for ATM Networks.- 25. Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties.- 26. A New Serial/Parallel Architecture for a LowPower Modular Multiplier.- 27. Defending Against Null Calls Stream Attacks by Using a Double- Threshold Dynamic Filter.- 28. A Multi-party Non-repudiation Protocol.- 29. Analysis and Design of E-voting Protocol.- 30. Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents’ Community.- 31. Towards Network Denial of Service Resistant Protocols.- 32. A Generic Graphical Specification Environment for Security Protocol Modelling.- 33. Anonymous Electronic Voting System with Non-Transferable Voting Passes.- 34. Improving Packet Filters Management through Automatic and Dynamic Schemes.- 35. A Context-Sensitive Access Control Model and Prototype Implementation.- 36. Regulating Access to Semistructured Information on the Web.- 37. On the Practical Feasibility of Secure Distributed Computing: A Case Study.- 38. Elements of A Language for Role-Based Access Control.- 39. Disallowing Unauthorized State Changes of Distributed Shared Objects.- 40. Framework for Security Analysis and Access Control in a Distributed Service Medical Imaging Network.- 41. On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Nondescriptive Foundations.- 42. Information Warfare: Fact or Fiction?.- 43. Enforcing Privacy by Withholding Private Information.- 44. The Changing Roles of Patent and Copyright Protection for Software and Communication Technology in the Internet Age.- 45. A Framework for Electronic Commerce Security.- 46. Electronic Payment Systems with Fair On-line Verification.- 47. Fair Electronic Cash Systems with Multiple Banks.- 48. Securing Mobile Agents for Electronic Commerce: an Experiment.- 49. A Flexible Management Framework for Certificate Status Validation.- 50. A Security Architecture for Electronic CommerceApplications.- 51. On the Development of the Advanced Encryption Standard.- 52. Public Key Infrastructure: Managing the e-Business Security.- Index of contributors.