Hardcover. Zustand: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less.
Sprache: Englisch
Verlag: Berlin : Springer, 2006
Anbieter: Antiquariat Thomas Haker GmbH & Co. KG, Berlin, Deutschland
Verbandsmitglied: GIAQ
Erstausgabe
Hardcover. Zustand: Wie neu. 1st ed. 250 S.; Ill. Like new. Shrink wrapped. Sprache: Englisch Gewicht in Gramm: 655.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 48,37
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. pp. 224 83 Illus.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 54,66
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 164 Figures, 52:B&W 6.14 x 9.21in or 234 x 156mm (Royal 8vo) Case Laminate on White w/Gloss Lam.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 60,06
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 60,06
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 75,32
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 155 pages. 9.10x6.40x0.50 inches. In Stock.
EUR 101,33
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 576 49:B&W 6.14 x 9.21 in or 234 x 156 mm (Royal 8vo) Perfect Bound on White w/Gloss Lam.
Anbieter: moluna, Greven, Deutschland
EUR 61,52
Anzahl: Mehr als 20 verfügbar
In den WarenkorbGebunden. Zustand: New. Includes machine learning and data mining technologiesUnique new approach is superior to existing centralized or hierarchical approachesDr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineer.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Intrusion Detection in Distributed Systems | An Abstraction-Based Approach | Peng Ning (u. a.) | Taschenbuch | Advances in Information Security | xix | Englisch | 2013 | Springer | EAN 9781461350910 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Zustand: Sehr gut. Zustand: Sehr gut | Seiten: 724 | Sprache: Englisch | Produktart: Bücher | This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009. The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 114,52
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 114,52
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Neuware - Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms as a second line of defense that protects information systems. Even if preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that the users can understand the security threats and risks and thus be better prepared for future attacks. This book unites three research contributions detailing new approaches that are superior to existing centralized or hierarchical approaches.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 138,72
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 150,83
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 150,83
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Taschenbuch. Zustand: Neu. Computer Security -- ESORICS 2009 | 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings | Michael Backes (u. a.) | Taschenbuch | xvi | Englisch | 2009 | Springer | EAN 9783642044434 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Information and Communications Security | 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings | Peng Ning (u. a.) | Taschenbuch | xiv | Englisch | 2006 | Springer | EAN 9783540494966 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 157,20
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 706 pages. 9.21x6.14x1.02 inches. In Stock.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 162,92
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4-7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences wereheld in Beijing, China (ICICS 1997); Sydney, Australia (ICICS 1999); Xi'an China (ICICS 2001); S- gapore (ICICS 2002); Hohhot City, China (ICICS 2003); Malaga, Spain (ICICS 2004); and Beijing, China (ICICS 2005). The conference proceedings of the past seven events have been published by Springer in the Lecture Notes in Computer Science series, in LNCS1334,LNCS1726,LNCS2229,LNCS 2513,LNCS 2836, LNCS 3269, and LNCS 3783, respectively. This year we received a total of 119 submissions on various aspects of - hoc and sensor network security. The Program Committee selected 22 regular papers and 17 short papers that cover a variety of topics, including security protocols, applied cryptography and cryptanalysis, access control in distributed systems, privacy, malicious code, network and systems security, and security implementations. Putting together ICICS 2006 was a team e ort. First of all, we would like to thank the authors of every paper, whether accepted or not, for submitting their papers to ICICS 2006. We would like to express our gratitude to the Program Committee members and the external reviewers, who worked very hard in - viewing the papers and providing suggestions for their improvements.
Sprache: Englisch
Verlag: Springer, Springer Spektrum, 2009
ISBN 10: 3642044433 ISBN 13: 9783642044434
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009. The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 215,59
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: moluna, Greven, Deutschland
EUR 178,14
Anzahl: Mehr als 20 verfügbar
In den WarenkorbGebunden. Zustand: New. Includes example applications for target tracking, scientific exploration and data acquisition in hazardous environmentsIncludes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target tracking and data acquisition. However, in many of these applications, wireless sensor networks could be deployed in hostile environments where there are malicious attacks against the network. Providing security services in sensor networks, however, turns out to be a very challenging task. First, sensor nodes usually have limited resources such as storage, bandwidth, computation and energy. It is often undesirable to implement expensive algorithms (e. g. , frequent public key operations) on sensor nodes. Second, sensor nodes are usually deployed unattended and built without compromise prevention in mind. An attacker can easily capture and compromise a few sensor nodes without being noticed. When sensor nodes are compromised, the attacker can learn all the secrets stored on them and launch a variety of attacks. Thus, any security mechanism for sensor networks has to be resilient to compromised sensor nodes.