Udvidet returret til d. 31. januar 2025

Datakryptering

Her finder du spændende bøger om Datakryptering. Nedenfor er et flot udvalg af over 316 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Roland Wagner, Erich J. Neuhold, Makoto Takizawa, mfl.
    580,95 kr.

  • af Aggelos Kiayias, Dimitris Gritzalis & Ioannis Askoxylakis
    587,95 kr.

  • af Michele Mosca
    577,95 kr.

  • af Matthew Robshaw & Lejla Batina
    605,95 kr.

  • af Jaideep Vaidya & Miroslaw Kutylowski
    597,95 - 600,95 kr.

  • af Roberto De Prisco & Michel Abdalla
    605,95 kr.

  • af Maki Yoshida & Koichi Mouri
    577,95 kr.

  • af Juan A. Garay & Rosario Gennaro
    599,95 - 602,95 kr.

  • af Serge Vaudenay, Ioana Boureanu & Philippe Owesarski
    603,95 kr.

  • af L. Jean Camp & M. Eric Johnson
    567,95 - 576,95 kr.

    Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear. The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book. The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.

  • af Lingyu Wang, Sushil Jajodia, Yves Deswarte & mfl.
    600,95 kr.

  • - IFIP TC11 18th International Conference on Information Security (SEC2003) May 26-28, 2003, Athens, Greece
    af Sabrina de Capitani di Vimercati
    1.131,95 - 1.140,95 kr.

    In light of the rapidly escalating age of uncertainty in the IT security and privacy world, this book provides the professional IT community and, in particular, security and data protection experts and researchers, with a selection of state-of-the-art material on emerging technologies for IT security and privacy issues. Furthermore, the book analyzes the new security threats and vulnerabilities that appear in modern information societies. Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.

  • af Klaus R. Dittrich, Zahir Tari, B. Thuraisingham & mfl.
    2.190,95 kr.

  • af Jason Papathanasiou, Uchitha Jayawickrama, Ana Paula Cabral Seixas Costa & mfl.
    716,95 kr.

    This book constitutes the proceedings of the 8th International Conference on Decision Support Systems Technologies, ICDSST 2022, held during May 23-25, 2022.The EWG-DSS series of International Conference on Decision Support System Technology (ICDSST) is planned to consolidate the tradition of annual events organized by the EWG-DSS in offering a platform for European and international DSS communities, comprising the academic and industrial sectors, to present state-of-the-art DSS research and developments, to discuss current challenges that surround decision-making processes, to exchange ideas about realistic and innovative solutions, and to co-develop potential business opportunities.The main aim of this year¿s conference is to investigate the role DSS and related technologies can play in mitigating the impact of pandemics and post-crisis recovery. The 15 papers presented in this volume were carefully reviewed and selected from 46 submissions. They were organized in topical sections as follows: decision support addressing modern industry; decision support addressing business and societal needs, and multiple criteria approaches.

  •  
    1.059,95 kr.

    ¿Handbook for CTFers: Zero to One¿ was written by the Nu1L team, one of Chinäs top CTF teams. As for Jeopardy-style CTFs, the content in the first 10 chapters of this book not only covers traditional categories of tasks like WEB, PWN and Crypto, but also includes some of the latest hot topics and techniques, such as blockchain. Case studies are provided for all of these types. Onsite Attack-Defend-style CTFs and penetration testing are introduced in Chapter 11 and Chapter 12. In order to help readers gain the most from the book, we have developed the N1Book platform, which addresses practical questions for different task categories. The book offers beginners a reliable, systematic tutorial on CTF competition. At the same time, it includes real case studies and a wealth of our competition experience, making it a valuable asset for experienced CTF players.

  • af David Coffin
    598,95 kr.

    Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords.Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards. If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert.Helps you protect against data loss, identity theft, SQL injection, and address spoofing Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more

  • af Giulio D'Agostino
    468,95 kr.

  • af Frank Rubin
    516,95 kr.

  • - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010, Proceedings
    af Masakatsu Nishigaki
    586,95 kr.

    This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea,Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs.

  • af Stefan Katzenbeisser, Andreas Uhl & Jana Dittmann
    574,95 - 584,95 kr.

  • - 9th International IFIP TC 6 Networking Conference, Chennai, India, May 11-15, 2010, Proceedings
    af Mark Crovella
    588,95 kr.

    This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic areas: applications and services, network technologies, and internet design. All papers were considered on their merits by a uni?ed Technical ProgramCommittee (TPC); there was no attempt to enforce a quota among topic areas. We believe the resulting program is an excellentrepresentationofthebreadthofrecentadvancesinnetworkingresearch. This year, the conference received 101 full paper submissions from 23 co- trieson?vecontinents,re?ectingastrongdiversityinthenetworkingcommunity. Similarly, the 92 members of the TPC are from 21 countries and include a mix of academic, industry, and governmental a?liations. The TPC members, aided by some 50 external reviewers, provided a total of 470 reviews and follow-up discussions totaling more than 200 messages. The ?nal selections were made at a TPC meeting hosted by Columbia University in New York City, with both in-person and remote participation. In total, authors of accepted papers have academic and industry a?liations in 15 countries. We ?nally selected 24papers for presentationduring the conference technical sessions. A small number of papers were assigned a shepherd from the TPC to assist in paper revision. These statistics represent an acceptance rate of just under 24%, comparable to that of previous years. The TPC also identi?ed several papers that re?ect particularly promising early results; these papers were selected for presentation as work-in-progress papers and are identi?ed as such in the proceedings.

  • - Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January 4-5, 2010
    af Ajay Kumar
    567,95 kr.

    The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security. The benefits of biometrics technologies are apparent as they become important technologies for information security of governments, business enterprises, and individuals. At the same time, however, the use of biometrics has raised concerns as to issues of ethics, privacy, and the policy implications of its wi- spread use. The large-scale deployment of biometrics technologies in e-governance, e-security, and e-commerce has required that we launch an international dialogue on these issues, a dialogue that must involve key stakeholders and that must consider the legal, poli- cal, philosophical and cultural aspects of the deployment of biometrics technologies. The Third International Conference on Ethics and Policy of Biometrics and Inter- tional Data Sharing was highly successful in facilitating such interaction among - searchers, policymakers, consumers, and privacy groups. This conference was supported and funded as part of the RISE project in its ongoing effort to develop wide consensus and policy recommendations on ethical, medical, legal, social, cultural, and political concerns in the usage of biometrics and data security technologies. The - tential concerns over the deployment of biometrics systems can be jointly addressed by developing smart biometrics technologies and by developing policies for the - ployment of biometrics technologies that clearly demarcate conflicts of interest - tween stakeholders.

  • - Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings
    af Daniel J. Bernstein
    590,95 kr.

  • - 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008, Revised Selected Papers
    af Pierpaolo Degano
    577,95 kr.

    The present volume contains the proceedings of the 5th International Workshop on Formal Aspects in Security and Trust (FAST 2008), held in Malaga, Spain, October 9-10, 2008. FAST is an event a?liated with the 13th European Sym- sium on Research in Computer Security (ESORICS 2008). FAST 2008 was held under the auspices of the IFIP WG 1.7 on Foundations of Security Analysis and Design. The 5th International Workshop on Formal Aspects in Security and Trust (FAST 2008) aimed at continuing the successful e?ort of the previous three FAST workshop editions for fostering the cooperation among researchers in the areas of security and trust. As computing and network infrastructures become increasingly pervasive, and as they carry increasing economic activity, society needs well-matched security and trust mechanisms. These interactions incre- ingly span several enterprises and involve loosely structured communities of - dividuals. Participants in these activities must control interactions with their partners based on trust policies and business logic. Trust-based decisions - fectively determine the security goals for shared information and for access to sensitive or valuable resources. FAST sought for original papers focusing on formal aspects in: security and trust policy models; security protocol design and analysis; formal models of trustand reputation;logicsfor security andtrust;distributed trust management systems;trust-basedreasoning;digitalassetsprotection;dataprotection;privacy and ID issues; information ?ow analysis; language-based security; security and trust aspects in ubiquitous computing; validation/analysis tools; Web service security/trust/privacy; GRID security; security risk assessment; case studies.

  • - 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings
    af Pierangela Samarati
    586,95 kr.

  • - The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings
    af Josef Pieprzyk
    587,95 kr.

  • - First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, Revised Selected Papers
    af Alexander Sergienko
    580,95 kr.

    QUANTUMCOMM 2009--the International Conference on Quantum Communi- tion and Quantum Networking (from satellite to nanoscale)--took place in Vico Equense near Naples, Italy, during October 26-30, 2009. The conference made a significant step toward stimulating direct dialogue between the communities of quantum physics and quantum information researchers who work with photons, atoms, and electrons in pursuit of the common goal of investigating and utilizing the transfer of physical information between quantum systems. This meeting brought together experts in quantum communication, quantum inf- mation processing, quantum nanoscale physics, quantum photonics, and networking. In the light of traditional approaches to quantum information processing, quantum communication mainly deals with encoding and securely distributing quantum states of light in optical fiber or in free space in order to provide the technical means for quantum cryptography applications. Exciting advances in the area of quantum c- munication over the last decade have made the metropolitan quantum network a re- ity. Several papers presented at this meeting have demonstrated that quantum crypt- raphy is approaching the point of becoming a high-tech application rather than a - search subject. The natural distance limitation of quantum cryptography has been significantly augmented using ideas of global quantum communication with stab- orbit satellites. The results presented at this conference demonstrated that practical secure satellite communication is clearly within reach.

  • af Jennifer Seberry & Rei Safavi-Naini
    581,95 - 1.132,95 kr.

  • af Hsinchun Chen, John Leavitt, Daniel D. Zeng & mfl.
    567,95 - 1.155,95 kr.

  • af Michael Darnell
    582,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.