Verlag: Artech House Publishers, 2011
ISBN 10: 1608070395 ISBN 13: 9781608070398
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Hardback. Zustand: Good. The book has been read but remains in clean condition. All pages are intact and the cover is intact. Some minor wear to the spine.
Verlag: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, 2000
ISBN 10: 3540676600 ISBN 13: 9783540676607
Anbieter: Ammareal, Morangis, Frankreich
Softcover. Zustand: Bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2000. Ammareal reverse jusqu'à 15% du prix net de ce livre à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Slight signs of wear on the cover. Edition 2000. Ammareal gives back up to 15% of this book's net price to charity organizations.
Mehr Angebote von anderen Verkäufern bei ZVAB
Neu ab EUR 58,10
Gebraucht ab EUR 5,52
Mehr entdecken Softcover
Verlag: Springer Berlin / Heidelberg, 2009
ISBN 10: 354087741X ISBN 13: 9783540877417
Anbieter: Better World Books, Mishawaka, IN, USA
Erstausgabe
Zustand: Good. 1st Edition. Used book that is in clean, average condition without any missing pages.
Mehr Angebote von anderen Verkäufern bei ZVAB
Neu ab EUR 84,59
Gebraucht ab EUR 9,96
Mehr entdecken Hardcover Erstausgabe
Verlag: Pearson Education, Limited, 2000
ISBN 10: 0201877368 ISBN 13: 9780201877366
Anbieter: Better World Books, Mishawaka, IN, USA
Erstausgabe
Zustand: Good. 1st. Used book that is in clean, average condition without any missing pages.
Mehr Angebote von anderen Verkäufern bei ZVAB
Gebraucht ab EUR 12,25
Mehr entdecken Softcover Erstausgabe
Verlag: Addison Wesley, 1993
ISBN 10: 0201624397 ISBN 13: 9780201624397
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Gut. Zustand: Gut - Gebrauchs- und Lagerspuren. 01. Auflage. Innen: Seiten eingerissen. Aus der Auflösung einer renommierten Bibliothek. Kann Stempel beinhalten. | Seiten: 280 | Sprache: Englisch | Produktart: Bücher.
Verlag: Springer International Publishing, 2012
ISBN 10: 303100762X ISBN 13: 9783031007620
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's 'inside.' These 'insiders' usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges -- such as a DBA in database management systems. Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions. Table of Contents: Introduction / Authentication / Access Control / Anomaly Detection / Security Information and Event Management and Auditing / Separation of Duty / Case Study: Oracle Database Vault / Conclusion.
Verlag: Springer International Publishing, 2024
ISBN 10: 3031282612 ISBN 13: 9783031282614
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions.While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks.
Verlag: Springer International Publishing, 2023
ISBN 10: 3031282582 ISBN 13: 9783031282584
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions.While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks.
Verlag: Springer Berlin Heidelberg, 2014
ISBN 10: 3642426034 ISBN 13: 9783642426032
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Web services technologies are advancing fast and being extensively deployed in many di erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards,anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace all those new collaborative applications and to indicate a new, 'social' approach to generating and distributing Web content, characterized by open communication, decentralization of authority, and freedom to share and reuse. For Web services technologies to hold their promise, it is crucial that - curity of services and their interactions with users be assured. Con dentiality, integrity,availability,anddigitalidentitymanagementareallrequired.People need to be assured that their interactions with services over the Web are kept con dential and the privacy of their personal information is preserved. People need to be sure that information they use for looking up and selecting s- vicesiscorrectanditsintegrityisassured.Peoplewantservicestobeavailable when needed. They also require interactions to be convenient and person- ized, in addition to being private. Addressing these requirements, especially when dealing with open distributed applications, is a formidable challenge.
Verlag: Springer Berlin Heidelberg, 1996
ISBN 10: 3540617701 ISBN 13: 9783540617709
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.
Verlag: Springer International Publishing, 2021
ISBN 10: 3030884171 ISBN 13: 9783030884178
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021. The conference was originally planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic. The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were organized in topical sections as follows: Part I: network security; attacks; fuzzing; malware; user behavior and underground economy; blockchain; machine learning; automotive; anomaly detection; Part II: encryption; cryptography; privacy; differential privacy; zero knowledge; key exchange; multi-party computation.
Verlag: Springer International Publishing, 2021
ISBN 10: 3030884279 ISBN 13: 9783030884277
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021.The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were organized in topical sections as follows: Part I: network security; attacks; fuzzing; malware; user behavior and underground economy; blockchain; machine learning; automotive; anomaly detection; Part II: encryption; cryptography; privacy; differential privacy; zero knowledge; key exchange; multi-party computation.
Verlag: Springer US, 2012
ISBN 10: 1461378567 ISBN 13: 9781461378563
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Recent years have seen an explosive growth in the use of new database applications such as CAD/CAM systems, spatial information systems, and multimedia information systems. The needs of these applications are far more complex than traditional business applications. They call for support of objects with complex data types, such as images and spatial objects, and for support of objects with wildly varying numbers of index terms, such as documents. Traditional indexing techniques such as the B-tree and its variants do not efficiently support these applications, and so new indexing mechanisms have been developed. As a result of the demand for database support for new applications, there has been a proliferation of new indexing techniques. The need for a book addressing indexing problems in advanced applications is evident. For practitioners and database and application developers, this book explains best practice, guiding the selection of appropriate indexes for each application. For researchers, this book provides a foundation for the development of new and more robust indexes. For newcomers, this book is an overview of the wide range of advanced indexing techniques. Indexing Techniques for Advanced Database Systems is suitable as a secondary text for a graduate level course on indexing techniques, and as a reference for researchers and practitioners in industry.
Verlag: Springer US, 1997
ISBN 10: 0792399854 ISBN 13: 9780792399858
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Sehr gut. Zustand: Sehr gut - Gepflegter, sauberer Zustand. | Seiten: 268 | Sprache: Englisch | Produktart: Bücher.
Mehr Angebote von anderen Verkäufern bei ZVAB
Neu ab EUR 164,03
Gebraucht ab EUR 10,69
Mehr entdecken Hardcover
Verlag: Springer, 2009
ISBN 10: 3642033539 ISBN 13: 9783642033537
Anbieter: books4less (Versandantiquariat Petra Gros GmbH & Co. KG), Welling, Deutschland
Broschiert. Zustand: Gut. 833 Seiten; Das hier angebotene Buch stammt aus einer teilaufgelösten wissenschaftlichen Bibliothek und trägt die entsprechenden Kennzeichnungen (Rückenschild, Instituts-Stempel.); Schnitt und Einband sind etwas staubschmutzig; der Buchzustand ist ansonsten ordentlich und dem Alter entsprechend gut. Text in ENGLISCHER Sprache! Sprache: Englisch Gewicht in Gramm: 1150.
Verlag: Cham, Springer International Publishing., 2014
ISBN 10: 331905466X ISBN 13: 9783319054667
Anbieter: Antiquariat im Hufelandhaus GmbH vormals Lange & Springer, Berlin, Deutschland
235 mm x 155 mm. XIV, 198 p. Hardcover. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Stamped. Computational Social Sciences. Sprache: Englisch.
Verlag: Springer International Publishing, 2018
ISBN 10: 3030000052 ISBN 13: 9783030000059
Anbieter: moluna, Greven, Deutschland
Zustand: New.
Mehr Angebote von anderen Verkäufern bei ZVAB
Neu ab EUR 48,37
Gebraucht ab EUR 13,00
Mehr entdecken Softcover Erstausgabe
Verlag: Springer International Publishing, 2018
ISBN 10: 3030000141 ISBN 13: 9783030000141
Anbieter: moluna, Greven, Deutschland
Zustand: New.
Verlag: Springer International Publishing, 2018
ISBN 10: 3030000117 ISBN 13: 9783030000110
Anbieter: moluna, Greven, Deutschland
Zustand: New.
Verlag: Springer International Publishing, 2018
ISBN 10: 3030000206 ISBN 13: 9783030000202
Anbieter: moluna, Greven, Deutschland
Zustand: New.
Verlag: Springer International Publishing, 2018
ISBN 10: 3030000087 ISBN 13: 9783030000080
Anbieter: moluna, Greven, Deutschland
Zustand: New.
Verlag: Springer International Publishing, 2018
ISBN 10: 3030000176 ISBN 13: 9783030000172
Anbieter: moluna, Greven, Deutschland
Zustand: New.
Verlag: Springer Berlin Heidelberg, 2004
ISBN 10: 3540212000 ISBN 13: 9783540212003
Anbieter: moluna, Greven, Deutschland
Kartoniert / Broschiert. Zustand: New.
Verlag: Cham, Springer International Publishing., 2018
ISBN 10: 3030000052 ISBN 13: 9783030000059
Anbieter: Antiquariat im Hufelandhaus GmbH vormals Lange & Springer, Berlin, Deutschland
Erstausgabe
1st ed. 2018. 16 x 24 cm. XVIII, 743 S. XVIII, 743 p. 418 illus., 215 illus. in color. Softcoiver (Information Systems and Applications, incl. Internet/Web, and HCI; Lecture Notes in Computer Science). Sprache: Englisch.
Verlag: Springer Berlin Heidelberg, 2005
ISBN 10: 3540281274 ISBN 13: 9783540281276
Anbieter: moluna, Greven, Deutschland
Kartoniert / Broschiert. Zustand: New.
Verlag: CRC Press 2019-10-28, Boca Raton, 2019
ISBN 10: 0367027712 ISBN 13: 9780367027711
Anbieter: Blackwell's, London, Vereinigtes Königreich
hardback. Zustand: New. Language: ENG.
Verlag: Springer Berlin Heidelberg, 2002
ISBN 10: 3540433244 ISBN 13: 9783540433248
Anbieter: moluna, Greven, Deutschland
Zustand: New.