Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings: Communications in Computer and Information Science, cartea 122
Editat de Wai-Chi Fang, Muhammad Khurram Khan, Kirk P. Arnett, Heau-jo Kang, Dominik Ślęzaken Limba Engleză Paperback – 22 noi 2010
Din seria Communications in Computer and Information Science
- 20%
Preț: 460.54 lei - 20%
Preț: 313.10 lei - 20%
Preț: 643.20 lei - 20%
Preț: 312.30 lei - 20%
Preț: 324.99 lei - 20%
Preț: 630.84 lei - 20%
Preț: 634.45 lei - 20%
Preț: 321.17 lei - 20%
Preț: 324.68 lei - 20%
Preț: 631.00 lei - 20%
Preț: 631.31 lei - 20%
Preț: 633.83 lei -
Preț: 377.68 lei - 20%
Preț: 388.30 lei - 20%
Preț: 317.05 lei -
Preț: 371.37 lei - 20%
Preț: 323.23 lei - 20%
Preț: 423.73 lei - 20%
Preț: 321.81 lei - 20%
Preț: 319.13 lei - 20%
Preț: 630.51 lei - 20%
Preț: 325.61 lei - 20%
Preț: 321.17 lei - 20%
Preț: 325.79 lei - 20%
Preț: 640.83 lei - 20%
Preț: 323.23 lei - 20%
Preț: 325.79 lei - 20%
Preț: 317.68 lei - 20%
Preț: 635.26 lei - 15%
Preț: 623.39 lei - 20%
Preț: 628.32 lei - 20%
Preț: 319.42 lei - 20%
Preț: 324.99 lei - 20%
Preț: 1014.25 lei - 20%
Preț: 804.07 lei - 20%
Preț: 529.54 lei - 20%
Preț: 631.31 lei - 20%
Preț: 1183.08 lei - 20%
Preț: 494.98 lei - 20%
Preț: 388.26 lei - 20%
Preț: 318.67 lei - 20%
Preț: 389.14 lei - 20%
Preț: 323.23 lei - 20%
Preț: 458.73 lei - 20%
Preț: 530.40 lei - 20%
Preț: 388.00 lei - 20%
Preț: 632.09 lei - 20%
Preț: 388.91 lei - 20%
Preț: 310.73 lei
Preț: 321.81 lei
Preț vechi: 402.26 lei
-20% Nou
Puncte Express: 483
Preț estimativ în valută:
56.95€ • 66.41$ • 49.100£
56.95€ • 66.41$ • 49.100£
Carte disponibilă
Livrare economică 25 decembrie 25 - 08 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642176098
ISBN-10: 3642176097
Pagini: 316
Ilustrații: XIII, 300 p. 125 illus.
Greutate: 0.48 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642176097
Pagini: 316
Ilustrații: XIII, 300 p. 125 illus.
Greutate: 0.48 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Impact of Finger Type in Fingerprint Authentication.- Using Arabic CAPTCHA for Cyber Security.- Information Assurance in Saudi Organizations – An Empirical Study.- Emerging Biometric Modalities: Challenges and Opportunities.- On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP.- Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices – An Empirical Study of Telecommunication Industry in Pakistan.- Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON.- Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device.- Secure OSGi Platform against Service Injection.- A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse.- Probabilistic Route Selection Algorithm for IP Traceback.- An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection.- Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model.- Histogram-Based Reversible Data Hiding with Quadtree Concepts.- MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology.- Performance Analysis of Cyber Security Awareness Delivery Methods.- Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.- One-Time Password System with Infinite Nested Hash Chains.- Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence.- Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor.- Fusion of Moving and Static Facial Features for Robust Face Recognition.- Human Authentication Based on ECG Waves Using Radon Transform.- Wireless Network Security Vulnerabilities and Concerns.- FigmentAuthentication Scheme in Wireless Sensor Network.- Issues of Security and Network Load in Presence – A Survey.- Discovering the Botnet Detection Techniques.- Contactless Biometrics in Wireless Sensor Network: A Survey.- A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems.- Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010.- Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model.- Internet SCADA Utilizing API’s as Data Source.- Insecure Information System’s Solution Using Isolation Method.- Communication Security for Control Systems in Smart Grid.- NMACA Approach Used to Build a Secure Message Authentication Code.
Caracteristici
Fast-track conference proceedings State-of-the-art research Up-to-date results