Computer Security in the 21st Century (eBook, PDF)
96,29 €
inkl. MwSt.
Sofort per Download lieferbar
Computer Security in the 21st Century (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Computer Security in the 21 st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.
Highlights include presentations of :
- Fundamental new security
- Cryptographic protocols and design,
- A new way of measuring network vulnerability: attack surfaces,
- Network vulnerability and building impenetrable systems,
- Multimedia content protection including a new standard for…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 12.13MB
- Upload möglich
Andere Kunden interessierten sich auch für
- Intrusion Detection Systems (eBook, PDF)149,79 €
- Debra CookCryptoGraphics (eBook, PDF)96,29 €
- Aggelos KiayiasEncryption for Digital Content (eBook, PDF)96,29 €
- Anoop SinghalData Warehousing and Data Mining Techniques for Cyber Security (eBook, PDF)96,29 €
- Jintai DingMultivariate Public Key Cryptosystems (eBook, PDF)117,69 €
- Donald AdjerohThe Burrows-Wheeler Transform: (eBook, PDF)96,29 €
- Yu HuaSearchable Storage in Cloud Computing (eBook, PDF)128,39 €
-
-
-
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.
Highlights include presentations of :
- Fundamental new security
- Cryptographic protocols and design,
- A new way of measuring network vulnerability: attack surfaces,
- Network vulnerability and building impenetrable systems,
- Multimedia content protection including a new standard for photographic images, JPEG2000.
Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.
Highlights include presentations of :
- Fundamental new security
- Cryptographic protocols and design,
- A new way of measuring network vulnerability: attack surfaces,
- Network vulnerability and building impenetrable systems,
- Multimedia content protection including a new standard for photographic images, JPEG2000.
Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.
Produktdetails
- Produktdetails
- Verlag: Springer US
- Erscheinungstermin: 5. Dezember 2005
- Englisch
- ISBN-13: 9780387240060
- Artikelnr.: 37286720
- Verlag: Springer US
- Erscheinungstermin: 5. Dezember 2005
- Englisch
- ISBN-13: 9780387240060
- Artikelnr.: 37286720
Computer Security in the 21st Century
Edited by D.T. Lee, S.P. Shieh, and J.D. Tygar
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: secure security protocol design, secure peer-to-peer P2P and ad hoc networks Ad Hoc Networks, multimedia security, and intrusion detection, defense and measurement.
Highlights include presentations of:
* Fundamental new security
* Cryptographic protocols and design,
* A new way of measuring network vulnerability: attack surfaces,
* Network vulnerability and building impenetrable systems,
* Multimedia content protection including a new standard for photographic images, JPEG2000.
Researchers and computer security developers will find in this volume book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.
ABOUT THE AUTHORS
D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security.
S. P.hiuh-Pyng Shieh is a Professor in the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems.
J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley. He served as chair of the Defense Department’s Study Group on Security with Privacy. Heworks in the areas of computer security, privacy, and electronic commerce. His current research includes strong privacy protections, security issues in sensor webs, and digital rights management.
Edited by D.T. Lee, S.P. Shieh, and J.D. Tygar
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: secure security protocol design, secure peer-to-peer P2P and ad hoc networks Ad Hoc Networks, multimedia security, and intrusion detection, defense and measurement.
Highlights include presentations of:
* Fundamental new security
* Cryptographic protocols and design,
* A new way of measuring network vulnerability: attack surfaces,
* Network vulnerability and building impenetrable systems,
* Multimedia content protection including a new standard for photographic images, JPEG2000.
Researchers and computer security developers will find in this volume book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.
ABOUT THE AUTHORS
D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security.
S. P.hiuh-Pyng Shieh is a Professor in the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems.
J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley. He served as chair of the Defense Department’s Study Group on Security with Privacy. Heworks in the areas of computer security, privacy, and electronic commerce. His current research includes strong privacy protections, security issues in sensor webs, and digital rights management.
Security Protocol Design.- Challenges in Protocol Design and Analysis.- Private Matching.- Authentication Protocol Analysis.- Self-Certified Approach for Authenticated Key Agreement.- P2P and Ad Hoc Networks.- Experimenting with Admission Control in P2P Networks.- Adaptive Random Key Distribution Schemes for Wireless Sensor Networks.- Intrusion Detection, Defense, Measurement.- Measuring Relative Attack Surfaces.- A Modeling of Intrusion Detection Systems with Identification Capability.- A Source-End Defense System Against DDoS Attacks.- Beagle: Tracking System Failures for Reproducing Security Faults.- Multimedia Security.- Web Application Security—Past, Present, and Future.- Securing JPEG2000 Code-Streams.- A Secret Information Hiding Scheme Based on Switching Tree Coding.
INTRODUCTION, D. T. Lee, S. P. Shieh, J. D. Tygar. -PART I: SECURITY PROTOCOL DESIGN. -Challenges in Protocol Design and Analysis, Dieter Gollmann. --Private Matching,Yaping Li, J. D. Tygar, Joseph M. Hellerstein. -Authentication Protocol Analysis, Jonathan Millen. -Self-certified Approach for Authenticated Key Agreement, Tzong-Chen Wu, Yen-Ching Lin. -PART II P2P AND AD HOC NETWORKS. -Experimenting with Admission Control in P2P Networks, Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi -Adaptive Random Key Distribution Schemes for Wireless Sensor Networks, Shih-I Huang, Shiuhpyng Shieh, S.Y. Wu. -PART III INTRUSION DETECTION, DEFENSE, MEASUREMENT. -Measuring Relative Attack Surfaces, Michael Howard, Jon Pincus, Jeannette M. Wing. -A Modeling of Intrusion Detection Systems with Identification Capability, Pei-Te Chen, Benjamin Tseng, Chi-Sung Laih. -A Source-End Defense System against DDoS Attacks, Fu-Yuan Lee, Shiuhpyng Shieh, JuiTing Shieh, Sheng-Hsuan Wang. -BEAGLE: Tracking System Failures for Reproducing Security Faults, Chang-Hsien Tsai, Shih-Hung Liu, Shuen-Wen Huang, Shih-Kun Huang, Deron Liang. -Part IV MULTIMEDIA SECURITY. -Web Application Security-Past, Present, and Future, Yao-Wen Huang, D. T. Lee. -Securing JPEG2000 CodeStreams, Robert H. Deng, Yongdong Wu, Di Ma. -A Secret Information Hiding Scheme Based on Switching Tree Coding, Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu ."
Security Protocol Design.- Challenges in Protocol Design and Analysis.- Private Matching.- Authentication Protocol Analysis.- Self-Certified Approach for Authenticated Key Agreement.- P2P and Ad Hoc Networks.- Experimenting with Admission Control in P2P Networks.- Adaptive Random Key Distribution Schemes for Wireless Sensor Networks.- Intrusion Detection, Defense, Measurement.- Measuring Relative Attack Surfaces.- A Modeling of Intrusion Detection Systems with Identification Capability.- A Source-End Defense System Against DDoS Attacks.- Beagle: Tracking System Failures for Reproducing Security Faults.- Multimedia Security.- Web Application Security—Past, Present, and Future.- Securing JPEG2000 Code-Streams.- A Secret Information Hiding Scheme Based on Switching Tree Coding.
INTRODUCTION, D. T. Lee, S. P. Shieh, J. D. Tygar. -PART I: SECURITY PROTOCOL DESIGN. -Challenges in Protocol Design and Analysis, Dieter Gollmann. --Private Matching,Yaping Li, J. D. Tygar, Joseph M. Hellerstein. -Authentication Protocol Analysis, Jonathan Millen. -Self-certified Approach for Authenticated Key Agreement, Tzong-Chen Wu, Yen-Ching Lin. -PART II P2P AND AD HOC NETWORKS. -Experimenting with Admission Control in P2P Networks, Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi -Adaptive Random Key Distribution Schemes for Wireless Sensor Networks, Shih-I Huang, Shiuhpyng Shieh, S.Y. Wu. -PART III INTRUSION DETECTION, DEFENSE, MEASUREMENT. -Measuring Relative Attack Surfaces, Michael Howard, Jon Pincus, Jeannette M. Wing. -A Modeling of Intrusion Detection Systems with Identification Capability, Pei-Te Chen, Benjamin Tseng, Chi-Sung Laih. -A Source-End Defense System against DDoS Attacks, Fu-Yuan Lee, Shiuhpyng Shieh, JuiTing Shieh, Sheng-Hsuan Wang. -BEAGLE: Tracking System Failures for Reproducing Security Faults, Chang-Hsien Tsai, Shih-Hung Liu, Shuen-Wen Huang, Shih-Kun Huang, Deron Liang. -Part IV MULTIMEDIA SECURITY. -Web Application Security-Past, Present, and Future, Yao-Wen Huang, D. T. Lee. -Securing JPEG2000 CodeStreams, Robert H. Deng, Yongdong Wu, Di Ma. -A Secret Information Hiding Scheme Based on Switching Tree Coding, Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu ."