Vi bøger
Levering: 1 - 2 hverdage

Bøger i Advances in Information Security serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • af Jun Li, Peter Reiher & Gerald J. Popek
    880,95 kr.

  • af Sushil Jajodia & Daniel Barbara
    880,95 kr.

  • af Sara Foresti
    880,95 kr.

  • af John Aycock
    880,95 kr.

    Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.

  • af Godfried B. Williams
    880,95 kr.

    Most leading IT companies in developing economies purchase expensive equipment which ensure fully secure transaction services provided to organizations that exchange funds through electronic means. The rational behind this hypothesis is based on the strong competition that exists among these leading IT companies. Contrary to companies in developing economies, there has been a certain level of complacency among advanced economies, although some academics and practitioners might disagree with this view. The irony of this analysis is that while investments in security among IT companies in advanced economies are limited in budget, the methods employed for assessing possible risks in the application of technologies are normally high in cost. Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user. Synchronizing E-Security is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, information systems and engineering, as well as internet security policies, algorithm design and risk assessment methods, distributed systems, and internet engineering.

  • af Sushil Jajodia, Peng Ning & Xiaoyang Sean Wang
    454,95 kr.

  • af Zeliha Dilsun Kirli
    880,95 kr.

  • af Neil F. Johnson
    880,95 kr.

    Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems. Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking &endash; Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry.

  • af Christopher Kruegel
    1.095,95 kr.

    INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced.  This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and cryptography.  The Internet is omnipresent and companies have increasingly put critical resources online.  This has given rise to the activities of cyber criminals. Virtually all organizations face increasing threats to their networks and the services they provide.  Intrusion detection systems (IDSs) take increased pounding for failing to meet the expectations researchers and IDS vendors continually raise.  Promises that IDSs are capable of reliably identifying malicious activity in large networks were premature and never tuned into reality. While virus scanners and firewalls have visible benefits and remain virtually unnoticed during normal operations, the situation is different with intrusion detection sensors.  State-of-the-art IDSs produce hundreds or even thousands of alerts every day.  Unfortunately, almost all of these alerts are false positives, that is, they are not related to security-relevant incidents.INTRUSION DETECTION AND CORRELATION: Challenges and Solutions analyzes the challenges in interpreting and combining (i.e., correlating) alerts produced by these systems.  In addition, existing academic and commercial systems are classified; their advantage and shortcomings are presented, especially in the case of deployment in large, real-world sites.INTRUSION DETECTION AND CORRELATION: Challenges and Solutions is designed for a professional audience composed of researchers and practitioners in industry.   This book is also suitable for graduate-level students in computer science.

  • - Application to Malicious Code Fingerprinting
    af Lingyu Wang, Djedjiga Mouheb, Mourad Debbabi, mfl.
    1.319,95 kr.

    This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications.

  •  
    1.209,95 kr.

    This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preservingframework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

  •  
    1.209,95 kr.

    This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preservingframework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

  • - Practice and Theory
     
    1.319,95 kr.

    This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios.Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Suchresilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission¿s survivability goals, and identify ways to design secure resilient ICS systems.This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.

  • af Lingyu Wang, Mourad Debbabi, Makan Pourzandi, mfl.
    877,95 - 1.207,95 kr.

    This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers.

  • - Practice and Theory
     
    1.317,95 kr.

    This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios.Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems.This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.

  • - From Data Publishing to Web Applications
    af Lingyu Wang & Wen Ming Liu
    880,95 - 1.023,95 kr.

    This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee.

  • af Philip S. Yu, Gang Li, Wanlei Zhou & mfl.
    1.307,95 kr.

    It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications.Early chapters are focused on two major directions, differentially private data publishing and differentially private data analysis.

  • - Static and Dynamic Approaches
    af Mohammad Ashiqur Rahman & Ehab S. Al-Shaer
    880,95 - 1.028,95 kr.

    The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids.

  • - A Framework for Supporting Active Cyber Defense
    af Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, mfl.
    712,95 - 727,95 kr.

    It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management.

  • - Threats and Solutions
    af Mauro Conti
    454,95 - 457,95 kr.

    This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs).

  • af Giovanni Livraga
    921,95 - 1.028,95 kr.

    It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data.

  • af Vincenzo Piuri, Fabio Scotti & Angelo Genovese
    454,95 - 782,95 kr.

    This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems.

  • - From Segmentation to Template Security
    af Peter Wild, Christian Rathgeb & Andreas Uhl
    1.125,95 - 1.167,95 kr.

    Iris Biometrics: From Segmentation to Template Security provides critical analysis, challenges and solutions on recent iris biometric research topics, including image segmentation, image compression, watermarking, advanced comparators, template protection and more.

  • af David Sands & Stefan Axelsson
    1.098,95 - 1.254,95 kr.

    Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. This book analyzes the false alarm problem, then applies results from the field of information visualization to the problem of intrusion detection.

  • - Technology, Security, Economics
    af Gerrit Bleumer
    1.146,95 - 1.443,95 kr.

    This book is the first comprehensive overview of contemporary systems for secure electronic/digital postage. It introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The world's industrial-scale electronic postage systems are sorted out with respect to this taxonomy.

  • - From Fundamentals to Handwriting
    af Claus Vielhauer
    1.319,95 - 1.353,95 kr.

    Conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. This work discusses aspects such as sensor characteristic dependency, and the generation of cryptographic keys from handwriting.

  • af Anne V. D. M. Kayem, Selim G. Akl & Patrick Martin
    1.097,95 - 1.121,95 kr.

    This book presents the challenges of designing hierarchical cryptographic key management algorithms to implement adaptive access control in dynamic environments and suggests solutions that will overcome these challenges.

  • af Chin-Tser Huang & Mohamed G. Gouda
    1.121,95 - 1.143,95 kr.

    This ground-breaking volume discusses a new method of countering denial-of-service attacks called hop integrity. It details a suite of protocols for providing hop integrity. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation.

  • af Edgar R. Weippl
    1.365,95 - 1.373,95 kr.

    As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.

  • af Donggang Liu & Peng Ning
    1.221,95 - 1.713,95 kr.

    This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.