Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book constitutes the proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2011, held in Grenoble, France, in October 2011. The 29 papers presented were carefully reviewed and selected from 79 submissions. They cover the following areas: ad-hoc, sensor, and peer-to-peer networks; safety and verification; security; self-organizing and autonomic systems; and self-stabilization.
Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as "e;are we more secure than yesterday"e; or "e;how does the security of one network configuration compare with another one"e;. In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring System (CVSS). Our techniques analyze all attack paths through a network, for an attacker to reach certain goal(s).
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011. The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.
This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.
This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.
This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011.The 31 papers, presented together with 2 invited talks, were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on lattice-base cryptography, implementation and side channels, homomorphic cryptography, signature schemes, information-theoretic cryptography, symmetric key cryptography, attacks and algorithms, secure computation, composability, key dependent message security, and public key encryption.
Spar tid & Penge – skån miljøet er en opslagsbog til hjemmet med over 2.500 gamle husråd og gode ideer til en lettere hverdag. Bogen er forsynet med et meget detaljeret stikordsregister, så det er let at finde frem til de gode råd og tips, der findes om et bestemt emne. Bogen indeholder gamle, velafprøvede husmorråd, som har været brugt med succes gennem mange generationer samt en del nye, som er kommet til i de seneste år. Der er gode råd om personlig pleje, husapotek, madlavning, rengøring, tøjvask, strygning, syning, strikning, potteplanter, have, biler, cykler osv. Selvom der er rigtig mange ting i vores hverdag, der har ændret sig radikalt gennem de seneste hundrede år eller mere, så er der alligevel mange grundlæggende ting, som ikke har ændret sig ret meget. Vi skal stadig have mad hver dag, skal holde os selv, vores tøj og boliger rene og funktionsdygtige. Vi er gennemgående blevet mere miljøbevidste, og denne bog giver mange tips, hvordan du eksempelvis reducerer madspild og gør rent uden brug af farlige kemikalier. Du vil helt sikkert blive overrasket over at erfare, hvor mange daglige opgaver du faktisk kan klare, hvis du bare altid har eddike, citroner, bagepulver og klart opvaskemiddel i huset.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.