Computer Security in the 21st Century

 HC runder Rücken kaschiert

114,89 €*

Alle Preise inkl. MwSt.|Versandkostenfrei
ISBN-13:
9780387240053
Veröffentl:
2005
Einband:
HC runder Rücken kaschiert
Erscheinungsdatum:
29.03.2005
Seiten:
284
Autor:
D. T. Lee
Gewicht:
594 g
Format:
241x160x20 mm
Sprache:
Englisch
Beschreibung:

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.Highlights include presentations of : Fundamental new security Cryptographic protocols and design A new way of measuring network vulnerability: attack surfaces Network vulnerability and building impenetrable systems Multimedia content protection including a new standard for photographic images, JPEG2000.Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.
Computer security has opened a variety of new frontiers in the new millennium. This book explores the spectrum of newlyemerging areas in security, in topics ranging over privacy, intellectual property protection, communications, operating system design, programming languages and security, and mobile security. It includes contributions from an international collection of both experienced and young researchers in computer security. The book will be useful to computer network security professionals and researchers.
Security Protocol Design.- Challenges in Protocol Design and Analysis.- Private Matching.- Authentication Protocol Analysis.- Self-Certified Approach for Authenticated Key Agreement.- P2P and Ad Hoc Networks.- Experimenting with Admission Control in P2P Networks.- Adaptive Random Key Distribution Schemes for Wireless Sensor Networks.- Intrusion Detection, Defense, Measurement.- Measuring Relative Attack Surfaces.- A Modeling of Intrusion Detection Systems with Identification Capability.- A Source-End Defense System Against DDoS Attacks.- Beagle: Tracking System Failures for Reproducing Security Faults.- Multimedia Security.- Web Application Security-Past, Present, and Future.- Securing JPEG2000 Code-Streams.- A Secret Information Hiding Scheme Based on Switching Tree Coding.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga