Infrastructure Security
Editat de George Davida, Yair Frankel, Owen Reesen Limba Engleză Paperback – 24 sep 2002
Preț: 324.03 lei
Preț vechi: 405.04 lei
-20% Nou
Puncte Express: 486
Preț estimativ în valută:
57.34€ • 66.87$ • 50.34£
57.34€ • 66.87$ • 50.34£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540443094
ISBN-10: 3540443096
Pagini: 356
Ilustrații: XII, 340 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.54 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540443096
Pagini: 356
Ilustrații: XII, 340 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.54 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Biometrics.- Biometric Authentication in Infrastructure Security.- Denial of Access in Biometrics-Based Authentication Systems.- Identification, Authentication, and Process.- A Novel Approach to Proactive Password Checking.- Single Sign-On Architectures.- Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information.- Analysis Process.- How to Buy Better Testing Using Competition to Get the Most Security and Robustness for Your Dollar.- Structured Risk Analysis.- A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls.- Mobile Networks.- Authentication and Authorization of Mobile Clients in Public Data Networks.- A Contemporary Foreword on GSM Security.- Vulnerability Assessment and Logs.- Vulnerability Assessment Simulation for Information Infrastructure Protection.- Pseudonymizing Unix Log Files.- System Design.- DPS: An Architectural Style for Development of Secure Software.- A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping.- Different Smartcard-Based Approaches to Physical Access Control.- Formal Methods.- Authenticity and Provability — A Formal Framework.- Protocol Engineering Applied to Formal Analysis of Security Systems.- Cryptographic Techniques.- Applications of Multiple Trust Authorities in Pairing Based Cryptosystems.- Plausible Deniability Using Automated Linguistic Stegonagraphy.- Virtual Software Tokens - A Practical Way to Secure PKI Roaming.- Bit-Serial AOP Arithmetic Architectures over GF(2m).- Networks.- A Practical Distributed Authorization System for GARA.- Design of a VPN Software Solution Integrating TCP and UDP Services.
Caracteristici
Includes supplementary material: sn.pub/extras