Vi bøger
Levering: 1 - 2 hverdage

Netværkssikkerhed

Her finder du spændende bøger om Netværkssikkerhed. Nedenfor er et flot udvalg af over 523 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Aditya Bagchi & Vijayalakshmi Atluri
    586,95 - 587,95 kr.

  • - Highlights of the Information Security Solutions Europe 2006 Conference
    af Sachar Paulus
    600,95 kr.

    This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the way we trust computers - Risk Management and how to quantify security threats - Awareness raising, Data Protection and how we secure corporate information.Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2006.

  • - Third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 Proceedings
    af Herve Debar
    572,95 kr.

    Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experiments and deployment issues. This year, RAID has grown one step further to establish itself as a well-known event in the security community, with the publication of hardcopy proceedings. RAID 2000 received 26 paper submissions from 10 countries and 3 continents. The program committee selected 14 papers for publication and examined 6 of them for presentation. In addition RAID 2000 received 30 extended abstracts proposals; 15 of these extended abstracts were accepted for presentation. - tended abstracts are available on the website of the RAID symposium series, http://www.raid-symposium.org/. We would like to thank the technical p- gram committee for the help we received in reviewing the papers, as well as all the authors for their participation and submissions, even for those rejected. As in previous RAID symposiums, the program alternates between fun- mental research issues, such as newtechnologies for intrusion detection, and more practical issues linked to the deployment and operation of intrusion det- tion systems in a real environment. Five sessions have been devoted to intrusion detection technology, including modeling, data mining and advanced techniques.

  •  
    633,95 kr.

    Digitalisierung und Informationssicherheit gehören untrennbar zusammenInformationssicherheit und Digitalisierung sind zwei Seiten derselben Medaille. Das BSI steht für beides und ist als die Cyber-Sicherheitsbehörde des Bundes Gestalter einer sicheren Digitalisierung. Wie die Spinne im Netz der Cyber-Sicherheit ist es vielfach vernetzt - nach innen und nach außen. Teil dieses vernetzten Denkens ist auch der Deutsche IT-Sicherheitskongress, den das BSI am 2. und 3. Februar 2021 zum 17. Mal ausgerichtet hat. Das Programm des in diesem Jahr virtuell stattfindenden Kongresses umfasste rund 30 Fachvorträge zu Themen wie Social Engineering, Notfallangebote für KMU, Hochsichere Cloud, Cyber Resilience, Post-Quanten-Kryptografie, Umgang mit Datenschutzkatastrophen, Awareness Trainings und Identitätsdiebstahl. Im Jubiläumsjahr des BSI bot der IT-Sicherheitskongress unter dem Motto "Deutschland. Digital. Sicher. 30 Jahre BSI" gleichzeitig eine Möglichkeit, auf 30 Jahre Informationssicherheit in Deutschland zurückzublicken.

  • af Herwig Unger
    517,95 kr.

    Mit seiner Tagung 2020 zum Thema "Kommunikationssicherheit im IoT" greift der GI/GMA/ITG-Fachausschuss Echtzeitsysteme ein immer wichtiger werdendes Thema in einer mehr und mehr vernetzten Welt auf. Die präsentierten Lösungen reichen dabei von Hardware über Systementwurf bis hin zu einzelnen Applikationen. Ein historischer Rückblick sowie ein erstmals in einem Buch präsentiertes, kompaktes Tutorial der Programmiersprache OPENPearl, die u. a. mit der Zielsetzung, funktionale Sicherheit in Steuerungssystemen zu gewährleisten, im Fachausschuss entworfen wurde, runden die Darstellungen ab.

  • af Jean-Philippe Aumasson
    207,95 kr.

    Crypto Dictionary is your full reference resource for all things cryptography.Cryptography from A5/0 to ZRTP Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for fellow experts and novices to the field alike, Crypto Dictionary is rigorous in its definitions, yet easy to read and laced with humor. You’ll find: A survey of crypto algorithms both widespread and niche, from RSA and DES to the USSR’s GOST cipherTrivia from the history of cryptography, such as the MINERVA backdoor in Crypto AG’s encryption algorithms, which may have let the US read the secret communications of foreign governmentsAn explanation of why the reference to the Blowfish cipher in the TV show 24 makes absolutely no senseDiscussions of numerous cryptographic attacks, like the slide attack and biclique attack (and the meaning of a crypto “attack”)Types of cryptographic proofs, such as zero-knowledge proofs of spacetimeA polemic against referring to cryptocurrency as “crypto”A look toward the future of cryptography, with discussions of the threat of quantum computing poses to our current cryptosystems and a nod to post-quantum algorithms, such as lattice-based cryptographic schemes Or, flip to any random page and learn something new, interesting, and mind-boggling for fun. Organized alphabetically, with hundreds of incisive entries and illustrations at your fingertips, Crypto Dictionary is the crypto world go-to guide that you’ll always want within reach.

  • af J. Michael Stewart
    719,95 kr.

    "Network Security, Firewalls, and VPNs is written for a course on Network Security and Perimeter Defense, with special emphasis placed on Firewalls and VPNs - two key tools for securing networks. It is currently divided into three parts - Part 1: Foundations of Network Security, Part 2: Technical Overview of Network Security, Firewalls, and VPNs, and Part 3: Implementation, Resources, and the Future"--

  • af Aleksandra Sowa
    622,95 kr.

    Auf Grundlage des risikoorientierten Prüfungsansatzes zeigt dieses Buch, wie effektive Prüfungsaktivitäten in einem komplexen Prüfungsumfeld mit besonderer Berücksichtigung aktueller Topthemen wie Datenschutz, Cybersecurity, Penetrationstests und Investigationen bei einer wachsenden Anzahl unternehmensinterner Ermittlungen durchgeführt werden können. Neuartige Instrumente und Methoden für die Arbeit der IT-Revision werden aufgezeigt und neue Ansätze diskutiert. In der zweiten, überarbeiteten und aktualisierten Auflage erfahren die Meldepflichten nach DSGVO, ITSiG bzw. NIS-Richtlinie eine besondere Betrachtung. Das Buch hilft, die Arbeitsweisen der Revision systematisch zu erfassen sowie Prüfungen zu planen und durchzuführen. Dabei bietet es sowohl fertige Lösungen als auch "Hilfe zur Selbsthilfe" an. Der Inhalt¿           Audit, Continuous Audit, Monitoring und Revision¿           Methodik der IT-Prüfung¿           IT-Revision bei Betrugsaufdeckung, Investigation und Prüfung doloser Handlungen  ¿           Penetrationstest als Instrument der Internen Revision¿           Meldepflichten nach DSGVO, ITSiG bzw. NIS-RL: Vorgaben und Prüfung¿           Prüfung kartellrechtlicher Compliance durch Mock Dawn Raid als Prüfungsmethode der IT-Revision Die Zielgruppen¿           Prüfer, Revisoren, IT-Auditoren, Datenschutzauditoren¿           IT-Compliance Manager, Risikomanager, (Information) Security Officer, interne Ermittler, Investigatoren¿           Datenschutzverantwortliche, Datenschutzbeauftragte¿           Studierende in Masterstudiengängen (z. B. Audit & Assurance, Informatik, Wirtschaftsinformatik)  Die AutorenDr. Aleksandra Sowa leitete zusammen mit dem deutschen Kryptologen Hans Dobbertin das Horst Görtz Institut für Sicherheit in der Informationstechnik, ist Autorin diverser Bücher und Fachpublikationen, zertifizierte Datenschutzbeauftragte, Datenschutzauditorin und IT-Compliance-Managerin (ITCM).Peter Duscha ist Diplom-Mathematiker mit über 15 Jahren Erfahrung in Interner Revision, u. a. in der Finanzbranche. Er ist akkreditierter Quality Assessor des DIIR und verfügt über mehrere Zertifizierungen im Bereich Interne Revision (CIA, CCSA, CRMA).Sebastian Schreiber ist Diplom-Informatiker und gründete 1998 in Tübingen das IT-Sicherheitsunternehmen SySS GmbH - heute deutscher Marktführer für Penetrationstests. Er ist als Experte für digitale Sicherheit in den Medien präsent und sitzt im Beirat der Zeitschrift "Datenschutz und Datensicherheit".

  • af Benjamin S. Riggan, Wesley E. Snyder & Cliff Wang
    559,95 kr.

    This SpringerBrief explores graphical password systems and examines novel drawing-based methods in terms of security, usability, and human computer-interactions. It provides a systematic approach for recognizing, comparing, and matching sketch-based passwords in the context of modern computing systems. The book offers both a security and usability analysis of the accumulative framework used for incorporating handwriting biometrics and a human computer-interaction performance analysis. The chapters offer new perspectives and experimental results regarding model uniqueness, recognition tolerance, and the human-computer interaction. The results demonstrate that biometrics reduce the equal error rate (EER) by more than 10%, and show that people are capable of accurately reproducing a sketch-based password. Fundamentals of Sketch-based Passwords: A General Framework targets computer scientists and engineers focused on computer security, biometrics, and human factors. Advanced-level students in computer science and electrical engineering will find this material useful as a study guide for their classes.

  • af Massimo Felici & Frances Cleary
    567,95 kr.

    This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014. The 14 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on security; accountability, data protection and privacy; research and innovation.

  • - International Symposium, CNDS 2013, Tehran, Iran, December 25-26, 2013, Revised Selected Papers
    af Amir Hossein Jahangir
    567,95 kr.

    This book constitutes the refereed proceedings of the International Symposium on Computer Networks and Distributed Systems, CNDS 2013, held in Tehran, Iran, in December 2013. The 14 full papers presented were carefully reviewed and selected from numerous submissions. They are organized in topical sections such as cognitive and multimedia networks; wireless sensor networks; security; clouds and grids.

  • af Sjouke Mauw & Christian Damsgaard Jensen
    570,95 kr.

    This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.

  • af Danda B. Rawat, Di Jin, Jaime Lloret Mauri & mfl.
    591,95 kr.

    This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2014, held in Delhi, India, in September 2013. The 36 revised full papers presented together with 12 work-in-progress papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on security and privacy in networked systems; authentication and access control systems; encryption and cryptography; system and network security; work-in-progress.

  • af Alexander Kott
    1.126,95 kr.

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for this book. Situational awareness is exceptionally prominent in the field of cyber defense. It involves science, technology and practice of perception, comprehension and projection of events and entities in cyber space. Chapters discuss the difficulties of achieving cyber situational awareness ¿ along with approaches to overcoming the difficulties - in the relatively young field of cyber defense where key phenomena are so unlike the more conventional physical world. Cyber Defense and Situational Awareness is designed as a reference for practitioners of cyber security and developers of technology solutions for cyber defenders. Advanced-level students and researchers focused on security of computer networks will also find this book a valuable resource.

  • af Herbert Bos, Angelos Stavrou & Georgios Portokalidis
    595,95 kr.

    This book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detection, browser security, web application security, wireless security, vulnerability analysis.

  • - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings
    af Claudia Eckert
    569,95 kr.

    This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.

  • af Xiaoyu Ruan
    428,95 kr.

    Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine.It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work.

  • af Guy Pujolle, Harry Perros, Ulf Körner, mfl.
    1.756,95 kr.

    This was the first conference jointly organized by the IFIP Working Groups 6. 2, 6. 3, and 6. 4. Each of these three Working Groups has its own established series of conferences. Working Group 6. 2 sponsors the Broadband Communications series of conferences (Paris 1995, Montreal 1996, Lisboa 1997, Stuttgart 1998, and Hong-Kong 1999). Working Group 6. 3 sponsors the Performance of Communication Systems series of conferences (Paris 1981, Zürich 1984, Rio de Janeiro 1987, Barcelona 1990, Raleigh 1993, Istanbul 1995, and Lund 1998). Working Group 6. 4 sponsors the High Performance Networking series of conferences (Aaren 1987, Liège 1988, Berlin 1990, Liège 1992, Grenoble 1994, Palma 1995, New York 1997, Vienna 1998). It is expected that this new joint conference will take place every two years. In view of the three sponsoring Working Groups, there were three separate tracks, one per Working Group. Each track was handled by a different co chairman. Specifically, the track of Working Group 6. 2 was handled by Ulf Körner, the track of Working Group 6. 3 was handled by Ioanis Stavrakakis, and the track of Working Group 6. 4 was handled by Serge Fdida. The overall program committee chairman was Harry Perros, and the general conference chairman was Guy Pujolle. A total of 209 papers were submitted to the conference of which 82 were accepted. Each paper was submitted to one of the three tracks.

  • - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings
    af Phong Q. Nguyen
    614,95 kr.

    This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.

  • af Yehuda Lindell
    616,95 kr.

    This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.

  • - First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers
    af Bart Preneel
    522,95 kr.

    This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.

  • af Stefan Katzenbeisser, Andreas Uhl & Jana Dittmann
    574,95 - 584,95 kr.

  • af Vladimir Gorodetsky, Igor Kotenko & Victor Skormin
    580,95 - 594,95 kr.

  • af Matthew Wright & Simone Fischer-Hübner
    576,95 - 580,95 kr.

  • af Moti Yung, Markus Jakobsson & Jianying Zhou
    590,95 - 1.133,95 kr.

  • af Yevgeni Koucheryavy, Lefteris Mamatas, Ibrahim Matta & mfl.
    585,95 kr.

    This book constitutes the refereed proceedings of the 10th International Conference on Wired / Wireless Internet Communications, WWIC, held in Santorini island, Greece during June 6-8, 2012. The 23 revised full papers and 6 short papers presented were carefully reviewed and selected from 50 submissions. The papers are organized in six thematically-distinct technical sessions, covering the following major topics: virtual networks and clouds, multimedia systems, wireless sensor networks and localization, delay-tolerant and opportunistic networks, handover techniques and channel access, and ad hoc networks

  • af Johannes Buchmann, Marc Fischlin & Mark Manulis
    614,95 kr.

    This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

  • af Ronald Cramer
    609,95 kr.

    This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.

  • af Hui Li, Jianying Zhou & Xuejia Lai
    586,95 kr.

    This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.

  • af Cliff B. Jones & John L. Lloyd
    597,95 kr.

    This Festschrift volume, published in honor of Brian Randell on the occasion of his 75th birthday, contains a total of 37 refereed contributions. Two biographical papers are followed by the six invited papers that were presented at the conference 'Dependable and Historic Computing: The Randell Tales', held during April 7-8, 2011 at Newcastle University, UK. The remaining contributions are authored by former scientific colleagues of Brian Randell.The papers focus on the core of Brian Randell's work: the development of computing science and the study of its history. Moreover, his wider interests are reflected and so the collection comprises papers on software engineering, storage fragmentation, computer architecture, programming languages and dependability. There is even a paper that echoes Randell's love of maps.After an early career with English Electric and then with IBM in New York and California, Brian Randell joined Newcastle University. His main research has been on dependable computing in all its forms, especially reliability, safety and security aspects, and he has led several major European collaborative projects.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.