An Abstract Reduction Model for Computer Security Risk.- Remediation Graphs for Security Patch Management.- Security Modelling for Risk Analysis.- Contrasting Malicious Applets by Modifying the Java Virtual Machine.- Analyzing Network Management Effects with Spin and cTLA.- Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics.- Meeting the Global Challenges of Security Incident Response.- Security in Globally Distributed Industrial Information Systems.- A Case for Information Ownership in ERP Systems.- Interactive Access Control for Web Services.- Identity-Based Key Infrastructures (IKI).- Modint: A Compact Modular Arithmetic Java Class Library for Cellular Phones, and its Application to Secure Electronic Voting.- Dependable Security by Twisted Secret Sharing.- A Language Driven Intrusion Detection System for Event and Alert Correlation.- Install-Time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks.- Eigenconnections to Intrusion Detection.- Visualising Intrusions: Watching the Webserver.- A Long-Term Trial of Keystroke Profiling Using Digraph, Trigraph and Keyword Latencies.- Trusted Computing, Trusted Third Parties, and Verified Communications.- Maille Authentication.- Supporting end-to-end Security Across Proxies with Multiple-Channel SSL.- A Content-Protection Scheme for Multi-Layered Reselling Structures.- An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.- IPsec Clustering.- Improving Secure Device Insertion in Home Ad Hoc Networks.- Spam Filter Analysis.- Collective Signature for Efficient Authentication of XML Documents.- Updating Encrypted XML Documents on Untrusted Machines.- Efficient Simultaneous Contract Signing.- DHCP Authentication Using Certificates.- Recursive Sandboxes: Extending Systrace to Empower Applications.- Fast Digital Certificate Revocation.- Masks: Managing Anonymity while Sharing Knowledge to Servers.- Security and Differentiated Hotspot Services Through Policy-based Management Architecture.- Key Management for Secure Multicast in Hybrid Satellite Networks.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: PBShop.store US, Wood Dale, IL, USA
PAP. Zustand: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bestandsnummer des Verkäufers L0-9781475780154
Anzahl: Mehr als 20 verfügbar
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
PAP. Zustand: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bestandsnummer des Verkäufers L0-9781475780154
Anzahl: Mehr als 20 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Bestandsnummer des Verkäufers ria9781475780154_new
Anzahl: Mehr als 20 verfügbar