Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, cartea 50
Editat de Sushil Jajodia, Jianying Zhouen Limba Engleză Paperback – 3 sep 2010
Din seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- 5%
Preț: 307.64 lei - 20%
Preț: 314.67 lei -
Preț: 385.99 lei - 20%
Preț: 498.46 lei - 20%
Preț: 270.83 lei - 20%
Preț: 270.73 lei - 20%
Preț: 270.83 lei - 20%
Preț: 317.05 lei - 20%
Preț: 270.23 lei - 20%
Preț: 270.98 lei - 20%
Preț: 314.67 lei - 20%
Preț: 317.05 lei - 20%
Preț: 326.72 lei - 20%
Preț: 321.03 lei - 20%
Preț: 313.42 lei - 20%
Preț: 458.69 lei - 20%
Preț: 317.05 lei - 20%
Preț: 494.87 lei - 20%
Preț: 530.10 lei - 20%
Preț: 495.28 lei - 20%
Preț: 495.12 lei - 20%
Preț: 458.99 lei - 20%
Preț: 388.57 lei - 20%
Preț: 494.83 lei - 18%
Preț: 931.81 lei - 20%
Preț: 529.35 lei - 20%
Preț: 494.68 lei - 20%
Preț: 495.67 lei - 20%
Preț: 388.11 lei - 20%
Preț: 573.45 lei - 20%
Preț: 647.15 lei - 20%
Preț: 388.26 lei - 20%
Preț: 459.10 lei - 20%
Preț: 315.48 lei - 20%
Preț: 459.55 lei - 20%
Preț: 635.26 lei - 5%
Preț: 553.86 lei - 20%
Preț: 481.11 lei - 20%
Preț: 319.42 lei - 20%
Preț: 459.78 lei - 20%
Preț: 956.44 lei - 20%
Preț: 335.29 lei - 20%
Preț: 329.60 lei - 20%
Preț: 642.40 lei - 20%
Preț: 328.94 lei - 20%
Preț: 328.16 lei -
Preț: 370.10 lei - 20%
Preț: 644.77 lei - 5%
Preț: 287.80 lei - 20%
Preț: 314.86 lei
Preț: 632.41 lei
Preț vechi: 790.51 lei
-20% Nou
Puncte Express: 949
Preț estimativ în valută:
111.91€ • 130.51$ • 98.26£
111.91€ • 130.51$ • 98.26£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642161605
ISBN-10: 364216160X
Pagini: 514
Ilustrații: XIII, 500 p. 160 illus.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.76 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 364216160X
Pagini: 514
Ilustrații: XIII, 500 p. 160 illus.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.76 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
Professional/practitionerCuprins
Malware and Email Security.- SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection.- Analyzing and Exploiting Network Behaviors of Malware.- Inexpensive Email Addresses An Email Spam-Combating System.- Anonymity and Privacy.- Privacy Administration in Distributed Service Infrastructure.- On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.- Wireless Security.- A Study on False Channel Condition Reporting Attacks in Wireless Networks.- Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services.- Saving Energy on WiFi with Required IPsec.- Systems Security – I.- Transparent Protection of Commodity OS Kernels Using Hardware Virtualization.- A Generic Construction of Dynamic Single Sign-on with Strong Security.- DeCore: Detecting Content Repurposing Attacks on Clients’ Systems.- Network Security – I.- Realizing a Source Authentic Internet.- Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks.- Attacking Beacon-Enabled 802.15.4 Networks.- Supporting Publication and Subscription Confidentiality in Pub/Sub Networks.- Security Protocols – I.- CED2: Communication Efficient Disjointness Decision.- Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes.- Context-Aware Usage Control for Android.- System Security – II.- Efficient Isolation of Trusted Subsystems in Embedded Systems.- Enhancing Host Security Using External Environment Sensors.- FADE: Secure Overlay Cloud Storage with File Assured Deletion.- Security Protocols – II.- A NewInformation Leakage Measure for Anonymity Protocols.- Hidden Markov Models for Automated Protocol Learning.- Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast.- Network Security – II.- Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly.- The Hitchhiker’s Guide to DNS Cache Poisoning.- A Formal Definition of Online Abuse-Freeness.
Caracteristici
Up to date results Fast conference proceedings State-of-the-art report