Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher der Reihe Advances in Information Security

Filter
Filter
Ordnen nachSortieren Reihenfolge der Serie
  • von Dimitris A. Gritzalis
    94,00 - 96,00 €

    Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems.

  • - Concepts and Techniques
    von Ali A. Ghorbani, Wei Lu & Mahbod Tavallaee
    104,00 €

    This is a comprehensive text on intrusion detection. It offers reviews of the fundamentals in the field and covers all the latest developments. Too, it provides case studies at the end of each chapter.

  •  
    96,00 €

    Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY.

  • - Practice and Theory
     
    140,00 €

    This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios.Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems.This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.

  • von Charles A. Shoniregun, Kudakwashe Dube & Fredrick Mtenzi
    109,00 €

    The rise of various demands in healthcare is driving innovation in healthcare information management. This book is the first comprehensive exploration into the challenges of e-healthcare information and security policy technologies.

  •  
    131,00 €

    This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense.

  • von Aggelos Kiayias & Serdar Pehlivanoglu
    94,00 €

    This is a mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. It includes a complete description of broadcast encryption with various revocation and tracing functionalities.

  •  
    140,00 €

    This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes.The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions ¿ this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

  •  
    185,00 €

    This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general.

  •  
    139,00 €

    Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.

  •  
    140,00 €

    To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more.

  • - From Segmentation to Template Security
    von Peter Wild, Christian Rathgeb & Andreas Uhl
    122,00 - 123,00 €

    Iris Biometrics: From Segmentation to Template Security provides critical analysis, challenges and solutions on recent iris biometric research topics, including image segmentation, image compression, watermarking, advanced comparators, template protection and more.

  • - Issues and Research
     
    94,00 €

    Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research.

  • von Ulrich Flegel
    101,00 €

    Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse.

  • von Zeliha Dilsun Kirli
    94,00 €

    Mobile Computation with Functions explores distributed computation with languages which adopt functions as the main programming abstraction and support code mobility through the mobility of functions between remote sites.

  • von Godfried B. Williams
    94,00 €

    Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies.

  • - Creating Asymmetric Uncertainty for Cyber Threats
     
    120,00 €

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers.

  • von David Sands & Stefan Axelsson
    94,00 €

    Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. This book analyzes the false alarm problem, then applies results from the field of information visualization to the problem of intrusion detection.

  •  
    139,00 €

    To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more.

  •  
    186,00 €

    This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks. It is suitable as a text for computer science courses in wireless systems and security. Hence the wireless network synchronization needs to be both robust and secure.

  • - A Framework for Supporting Active Cyber Defense
    von Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, usw.
    140,00 - 141,00 €

    It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management.

  • von Edgar R. Weippl
    94,00 - 100,00 €

    As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.

  • von Donggang Liu & Peng Ning
    139,00 €

    This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security.

  • von Chin-Tser Huang & Mohamed G. Gouda
    94,00 €

    This ground-breaking volume discusses a new method of countering denial-of-service attacks called hop integrity. It details a suite of protocols for providing hop integrity. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation.

  • von John Aycock
    121,00 €

    It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry.

  • - Technology, Security, Economics
    von Gerrit Bleumer
    94,00 €

    This book is the first comprehensive overview of contemporary systems for secure electronic/digital postage. It introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The world's industrial-scale electronic postage systems are sorted out with respect to this taxonomy.

  • von Anne V. D. M. Kayem, Selim G. Akl & Patrick Martin
    94,00 €

    This book presents the challenges of designing hierarchical cryptographic key management algorithms to implement adaptive access control in dynamic environments and suggests solutions that will overcome these challenges.

  • - From Fundamentals to Handwriting
    von Claus Vielhauer
    94,00 €

    Conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. This work discusses aspects such as sensor characteristic dependency, and the generation of cryptographic keys from handwriting.

  • von Song Y. Yan
    140,00 €

    Intended for advanced level students in computer science and mathematics, this key text, now in a brand new edition, provides a survey of recent progress in primality testing and integer factorization, with implications for factoring based public key cryptography.

  • - Enabled Information Small-Medium Enterprises (TEISMES)
    von Charles A. Shoniregun
    94,00 - 100,00 €

    Details the key impacts and risk assessment within the context of technology-enabled information (TEI). This volume is designed as a secondary text for graduate students, and also for a professional audience of researchers and practitioners in industry.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.