Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings R. Sekar (u. a.) Taschenbuch Lecture Notes in Computer Science 2008 - Pasta blanda
2008, ISBN: 9783540898610
[ED: Taschenbuch], [PU: Springer Berlin], This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad… Más…
booklooker.de |
2008, ISBN: 9783540898610
[ED: Softcover], [PU: Springer, Berlin], This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad,… Más…
booklooker.de buecher.de GmbH & Co. KG Gastos de envío:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Details... |
2008, ISBN: 3540898611
[EAN: 9783540898610], Neubuch, [PU: Springer-Verlag Gmbh Nov 2008], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / DATENSICHERHEIT, Neuware - This book constitutes the refereed proceedings… Más…
AbeBooks.de Rheinberg-Buch, Bergisch Gladbach, Germany [53870650] [Rating: 5 (von 5)] NEW BOOK. Gastos de envío:Versandkostenfrei. (EUR 0.00) Details... |
2001, ISBN: 9783540898610
[ED: Taschenbuch], [PU: Springer-Verlag GmbH], Neuware - This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, he… Más…
booklooker.de buchversandmimpf2000 Gastos de envío:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Details... |
2008, ISBN: 9783540898610
Information Systems Security ab 74.99 € als Taschenbuch: 4th International Conference ICISS 2008 Hyderabad India December 16-20 2008 Proceedings. Auflage 2008. Aus dem Bereich: Bücher, Ra… Más…
Hugendubel.de Gastos de envío:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00) Details... |
Information Systems Security 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings R. Sekar (u. a.) Taschenbuch Lecture Notes in Computer Science 2008 - Pasta blanda
2008, ISBN: 9783540898610
[ED: Taschenbuch], [PU: Springer Berlin], This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad… Más…
2008, ISBN: 9783540898610
[ED: Softcover], [PU: Springer, Berlin], This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad,… Más…
2008
ISBN: 3540898611
[EAN: 9783540898610], Neubuch, [PU: Springer-Verlag Gmbh Nov 2008], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / DATENSICHERHEIT, Neuware - This book constitutes the refereed proceedings… Más…
2001, ISBN: 9783540898610
[ED: Taschenbuch], [PU: Springer-Verlag GmbH], Neuware - This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, he… Más…
2008, ISBN: 9783540898610
Information Systems Security ab 74.99 € als Taschenbuch: 4th International Conference ICISS 2008 Hyderabad India December 16-20 2008 Proceedings. Auflage 2008. Aus dem Bereich: Bücher, Ra… Más…
Datos bibliográficos del mejor libro coincidente
Autor: | |
Título: | |
ISBN: |
Detalles del libro - Information Systems Security
EAN (ISBN-13): 9783540898610
ISBN (ISBN-10): 3540898611
Tapa dura
Tapa blanda
Año de publicación: 2008
Editorial: Springer Berlin Heidelberg
307 Páginas
Peso: 0,487 kg
Idioma: eng/Englisch
Libro en la base de datos desde 2007-09-05T03:08:56+02:00 (Madrid)
Página de detalles modificada por última vez el 2023-03-09T17:21:33+01:00 (Madrid)
ISBN/EAN: 9783540898610
ISBN - escritura alterna:
3-540-89861-1, 978-3-540-89861-0
Mode alterno de escritura y términos de búsqueda relacionados:
Título del libro: information security, international conference computer science, hyderabad, proceedings all india, lecture notes computer science
Datos del la editorial
Autor: R. Sekar; Arun K. Pujari
Título: Lecture Notes in Computer Science; Security and Cryptology; Information Systems Security - 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings
Editorial: Springer; Springer Berlin
307 Páginas
Año de publicación: 2008-11-24
Berlin; Heidelberg; DE
Idioma: Inglés
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 307 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Computersicherheit; Verstehen; Informatik; biometric; bluetooth security; complexity; computer security; decidability; model checking; privacy; secure voting; security; service-oriented computing; Data and Information Security; Computer Communication Networks; Information Storage and Retrieval; IT Operations; Biometrics; Cryptology; Netzwerksicherheit; Netzwerk-Hardware; Informationsrückgewinnung, Information Retrieval; Data Warehousing; Wirtschaftsmathematik und -informatik, IT-Management; Mustererkennung; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; EA
Keynote Address.- BitBlaze: A New Approach to Computer Security via Binary Analysis.- Languages and Formal Methods.- On the Decidability of Model-Checking Information Flow Properties.- Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties.- Implicit Flows: Can’t Live with ‘Em, Can’t Live without ‘Em.- Protocols.- A Robust Reputation Scheme for Decentralized Group Management Systems.- Complexity of Checking Freshness of Cryptographic Protocols.- Secure Internet Voting Based on Paper Ballots.- Short Papers.- A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper).- A Framework for Trustworthy Service-Oriented Computing (Short Paper).- Revisiting Bluetooth Security (Short Paper).- A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper).- Keynote Address.- Computing on Encrypted Data.- Ongoing Research.- Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators.- Proxy Re-signature Schemes.- Keynote Address.- Fast Signature Matching Using Extended Finite Automaton (XFA).- Intrusion Detection.- Real-Time Alert Correlation with Type Graphs.- Incorporation of Application Layer Protocol Syntax into Anomaly Detection.- A Parallel Architecture for Stateful, High-Speed Intrusion Detection.- Biometrics, Forensics and Steganography.- Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion.- Audio Watermarking Based on Quantization in Wavelet Domain.- Overwriting Hard Drive Data: The Great Wiping Controversy.- Practical Applications.- Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks.- Privacy Management for Facebook.- HyDRo – Hybrid Development of Roles.- KeynoteAddress.- The Enlightened Era of Enterprise Security (Invited Talk).Más, otros libros, que pueden ser muy parecidos a este:
Último libro similar:
9780134647272 Information Systems Security (Fisher Royal, P.,)
< para archivar...