Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher der Reihe Advances in Information Security

Filter
Filter
Ordnen nachSortieren Reihenfolge der Serie
  • - An Abstraction-Based Approach
    von Sushil Jajodia, Peng Ning & Xiaoyang Sean Wang
    49,00 €

    Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems.

  • von Reza Montasari
    157,00 €

  • - Technology, Security, Economics
    von Gerrit Bleumer
    94,00 €

    This book is the first comprehensive overview of contemporary systems for secure electronic/digital postage. It introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The world's industrial-scale electronic postage systems are sorted out with respect to this taxonomy.

  • von Anne V. D. M. Kayem, Selim G. Akl & Patrick Martin
    94,00 €

    This book presents the challenges of designing hierarchical cryptographic key management algorithms to implement adaptive access control in dynamic environments and suggests solutions that will overcome these challenges.

  • - From Fundamentals to Handwriting
    von Claus Vielhauer
    94,00 €

    Conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. This work discusses aspects such as sensor characteristic dependency, and the generation of cryptographic keys from handwriting.

  • von Song Y. Yan
    140,00 €

    Intended for advanced level students in computer science and mathematics, this key text, now in a brand new edition, provides a survey of recent progress in primality testing and integer factorization, with implications for factoring based public key cryptography.

  • - Enabled Information Small-Medium Enterprises (TEISMES)
    von Charles A. Shoniregun
    94,00 - 100,00 €

    Details the key impacts and risk assessment within the context of technology-enabled information (TEI). This volume is designed as a secondary text for graduate students, and also for a professional audience of researchers and practitioners in industry.

  • von Kim-Kwang Raymond Choo
    94,00 - 95,00 €

    Secure Key Establishment discusses the problems encountered in this field. It also introduces several improved protocols with new proofs of security and covers several variants of the widely accepted Bellare and Rogaway model.

  • von Charles A. Shoniregun
    93,00 - 127,00 €

    This volume identifies the security problems facing internet communication protocols along with the risks associated with internet connections. It includes a number of different algorithms and protocols to provide a cohesive security framework.

  •  
    141,00 €

    Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.

  •  
    96,00 €

    This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience.

  • - Application of Game Theory and Adversarial Modeling
     
    95,00 €

    Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

  • - Application of Game Theory and Adversarial Modeling
     
    96,00 €

    Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

  • - Building the Scientific Foundation
     
    123,00 €

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors.

  • von Vincenzo Piuri, Fabio Scotti & Angelo Genovese
    50,00 €

    This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems.

  • - Static and Dynamic Approaches
    von Mohammad Ashiqur Rahman & Ehab S. Al-Shaer
    96,00 €

    The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids.

  • - A Framework for Supporting Active Cyber Defense
    von Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, usw.
    140,00 - 141,00 €

    It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management.

  • - Beyond the Hacker
     
    94,00 €

    This book defines the nature and scope of insider problems as viewed by the financial industry. The book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and a range of topics from critical IT infrastructure to insider threats.

  • - Building the Scientific Foundation
     
    122,00 €

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors.

  •  
    94,00 €

    Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together.

  • - Beyond the Hacker
     
    127,00 €

    This book defines the nature and scope of insider problems as viewed by the financial industry. The book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and a range of topics from critical IT infrastructure to insider threats.

  • von José A. Onieva, Javier Lopez & Jianying Zhou
    94,00 - 100,00 €

    The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation.

  • von Dimitris A. Gritzalis
    94,00 - 96,00 €

    Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems.

  • - Concepts and Techniques
    von Ali A. Ghorbani, Wei Lu & Mahbod Tavallaee
    100,00 €

    This is a comprehensive text on intrusion detection. It offers reviews of the fundamentals in the field and covers all the latest developments. Too, it provides case studies at the end of each chapter.

  •  
    96,00 €

    Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY.

  • - Practice and Theory
     
    140,00 €

    This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios.Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems.This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.

  • von Charles A. Shoniregun, Kudakwashe Dube & Fredrick Mtenzi
    109,00 €

    The rise of various demands in healthcare is driving innovation in healthcare information management. This book is the first comprehensive exploration into the challenges of e-healthcare information and security policy technologies.

  •  
    131,00 €

    This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense.

  • von Aggelos Kiayias & Serdar Pehlivanoglu
    94,00 €

    This is a mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. It includes a complete description of broadcast encryption with various revocation and tracing functionalities.

  •  
    140,00 €

    This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes.The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions ¿ this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.