Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 33,66
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. pp. 198 Illus.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2014
ISBN 10: 331904611X ISBN 13: 9783319046112
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 74,08
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 2014 edition. 70 pages. 9.00x6.00x0.25 inches. In Stock.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2019
ISBN 10: 3030297284 ISBN 13: 9783030297282
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 76,25
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 700 pages. 9.25x6.10x0.39 inches. In Stock.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 77,96
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 2013 edition. 315 pages. 9.25x6.10x0.73 inches. In Stock.
Sprache: Englisch
Verlag: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, 2013
ISBN 10: 3642392555 ISBN 13: 9783642392559
Anbieter: Kennys Bookstore, Olney, MD, USA
Zustand: New. Editor(s): Wang, Lingyu; Shafiq, Basit. Series: Lecture Notes in Computer Science / Information Systems and Applications, Incl. Internet/Web, and HCI. Num Pages: 319 pages, 71 black & white illustrations, biography. BIC Classification: UKN; UNF; UNH; URY; UYZM. Category: (P) Professional & Vocational. Dimension: 234 x 156 x 17. Weight in Grams: 492. . 2013. 2013th Edition. paperback. . . . . Books ship from the US and Ireland.
Sprache: Englisch
Verlag: Springer International Publishing AG, 2016
ISBN 10: 3319519654 ISBN 13: 9783319519654
Anbieter: Kennys Bookstore, Olney, MD, USA
Zustand: New. Editor(s): Cuppens, Frederic; Wang, Lingyu; Cuppens-Boulahia, Nora; Tawbi, Nadia; Garcia-Alfaro, Joaquin. Series: Lecture Notes in Computer Science. Num Pages: 361 pages, 83 black & white illustrations, biography. BIC Classification: GPJ; UKN; UMB; URY; UYQP. Category: (P) Professional & Vocational. Dimension: 235 x 155 x 20. Weight in Grams: 575. . 2016. 1st ed. 2017. Paperback. . . . . Books ship from the US and Ireland.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 81,71
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. reprint edition. 562 pages. 9.26x6.11x1.30 inches. In Stock.
EUR 48,37
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Sprache: Englisch
Verlag: Springer International Publishing, 2016
ISBN 10: 3319519654 ISBN 13: 9783319519654
Anbieter: moluna, Greven, Deutschland
EUR 48,37
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 93,07
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. xiv + 548.
Anbieter: BooksRun, Philadelphia, PA, USA
Paperback. Zustand: Very Good. 1. It's a well-cared-for item that has seen limited use. The item may show minor signs of wear. All the text is legible, with all pages included. It may have slight markings and/or highlighting.
Sprache: Englisch
Verlag: Springer International Publishing, Springer Nature Switzerland Aug 2019, 2019
ISBN 10: 3030297284 ISBN 13: 9783030297282
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 208 pp. Englisch.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing Dez 2016, 2016
ISBN 10: 3319519654 ISBN 13: 9783319519654
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Québec City, QC, Canada, in October 2016.The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions.The accepted papers cover diverse research themes, ranging from classic topics, such as malware, anomaly detection, and privacy, to emerging issues, such as security and privacy in mobile computing and cloud.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 376 pp. Englisch.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Jul 2013, 2013
ISBN 10: 3642392555 ISBN 13: 9783642392559
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -InhaltsangabePrivacy.- Access control.- Cloud computing.- Data outsourcing.- Mobile computing.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 320 pp. Englisch.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2014
ISBN 10: 331904611X ISBN 13: 9783319046112
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means of network defense than relying solely on the experience and skills of a human analyst. Key background information on attack graphs and network hardening helps readers understand the complexities of these tools and techniques. A common network hardening technique generates hardening solutions comprised of initially satisfied conditions, thereby making the solution more enforceable. Following a discussion of the complexity issues in this technique, the authors provide an improved technique that considers the dependencies between hardening options and employs a near-optimal approximation algorithm to scale linearly with the size of the inputs. Also included are automated solutions for hardening a network against sophisticated multi-step intrusions. Network Hardening: An Automated Approach to Improving Network Security is a valuable resource for researchers and professionals working in network security. It is also a useful tool for advanced-level students focused on security in computer science and electrical engineering.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2019
ISBN 10: 3030297284 ISBN 13: 9783030297282
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019.The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops:AIBlock 2019:First International Workshop on Application Intelligence and Blockchain SecurityAIoTS 2019:First International Workshop on Articial Intelligence and IndustrialInternet-of-Things SecurityCloud S&P 2019:First International Workshop on Cloud Security and PrivacyPriDA 2019:First InternationalWorkshop on Privacy-preserving Distributed DataAnalysisSiMLA 2019:First International Workshop on Security in Machine Learning andits Applications.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2013
ISBN 10: 3642392555 ISBN 13: 9783642392559
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The 16 revised full and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2016
ISBN 10: 3319519654 ISBN 13: 9783319519654
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Québec City, QC, Canada, in October 2016. The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions.The accepted papers cover diverse researchthemes, ranging from classic topics, such as malware, anomaly detection, and privacy,to emerging issues, such as security and privacy in mobile computing and cloud.
EUR 11,42
Anzahl: 1 verfügbar
In den WarenkorbZustand: Sehr gut. Zustand: Sehr gut | Seiten: 256 | Sprache: Englisch | Produktart: Bücher | This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models.The work is organized as follows: chapter 1 presents an introduction to software security, model-driven engineering, UML and aspect-oriented technologies. Chapters 2 and 3 provide an overview of UML language and the main concepts of aspect-oriented modeling (AOM) respectively. Chapter 4 explores the area of model-driven architecture with a focus on model transformations. The main approaches that are adopted in the literature for security specification and hardening are presented in chapter 5. After these more general presentations, chapter 6 introduces the AOM profile for security aspects specification. Afterwards, chapter 7 details the design and the implementation of the security weaving framework, including several real-life case studies to illustrate its applicability. Chapter 8 elaborates an operational semantics for the matching/weaving processes in activity diagrams, while chapters 9 and 10 present a denotational semantics for aspect matching and weaving in executable models following a continuation-passing style. Finally, a summary and evaluation of the work presented are provided in chapter 11.The book will benefit researchers in academia and industry as well as students interested in learning about recent research advances in the field of software security engineering.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2017
ISBN 10: 3319519654 ISBN 13: 9783319519654
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 78,81
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. revised edition. 376 pages. 9.25x6.10x0.85 inches. In Stock.
Sprache: Englisch
Verlag: Springer US, Chapman And Hall/CRC, 2013
ISBN 10: 1475780168 ISBN 13: 9781475780161
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Security is probably the most critical factor for the development of the 'Information Society'. E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful.Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2016
ISBN 10: 331936894X ISBN 13: 9783319368948
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 99,37
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. reprint edition. 256 pages. 9.25x6.10x0.58 inches. In Stock.
Anbieter: Buchpark, Trebbin, Deutschland
EUR 35,42
Anzahl: 1 verfügbar
In den WarenkorbZustand: Sehr gut. Zustand: Sehr gut | Seiten: 320 | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2018
ISBN 10: 3319882597 ISBN 13: 9783319882598
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 136,07
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. reprint edition. 207 pages. 9.25x6.10x0.51 inches. In Stock.
Zustand: New. 2018. Paperback. . . . . . Books ship from the US and Ireland.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing Sep 2018, 2018
ISBN 10: 3319882597 ISBN 13: 9783319882598
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since ¿you cannot improve what you cannot measure¿, a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknownattacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective.Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 224 pp. Englisch.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2018
ISBN 10: 3319882597 ISBN 13: 9783319882598
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since 'you cannot improve what you cannot measure', a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknownattacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 153,62
Anzahl: 3 verfügbar
In den WarenkorbZustand: New.