Контакты/Проезд
Доставка и Оплата
Помощь/Возврат
Корзина ()
Мои желания ()
История
Промокоды
Ваши заказы
+7(495) 980-12-10
пн-пт: 10-18 сб,вс: 11-18
shop@logobook.ru
Российская литература
Поиск книг
Поиск по списку ISBN
Расширенный поиск
Найти
Зарубежные издательства
Российские издательства
Авторы
|
Каталог книг
|
Издательства
|
Новинки
|
Учебная литература
|
Акции
|
Хиты
|
|
Войти
Регистрация
Забыли?
Network and System Security, Lopez Javier
Варианты приобретения
Цена:
13277.00р.
Кол-во:
Наличие:
Поставка под заказ.
Есть в наличии на складе поставщика.
Склад Америка: Есть
При оформлении заказа до:
2025-07-28
Ориентировочная дата поставки:
Август-начало Сентября
При условии наличия книги у поставщика.
Добавить в корзину
в Мои желания
Автор:
Lopez Javier
Название:
Network and System Security
ISBN:
9783642386305
Издательство:
Springer
Классификация:
Безопасность работы в компьютерных сетях
ISBN-10: 364238630X
Обложка/Формат: Paperback
Страницы: 816
Вес: 1.12 кг.
Дата издания: 03.05.2013
Язык: English
Размер: 234 x 156 x 41
Ссылка на Издательство:
Link
Поставляется из: Германии
Описание: Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study.- A Technology Independent Security Gateway for Real-Time Multimedia Communication.- Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network.- Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.- Model the Influence of Sybil Nodes in P2P Botnets.- Network Security: Security Protocols and Practice A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture.- The OffPAD: Requirements and Usage.- Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks.- Using Trusted Platform Modules for Location Assurance in Cloud Networking.- Network Security: Network Attacks and Defense Tracing Sources of Anonymous Slow Suspicious Activities.- Static Analysis for Regular Expression Denial-of-Service Attacks.- Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding.- Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning.- System Security: Malware and Intrusions MADS: Malicious Android Applications Detection through String Analysis.- X-TIER: Kernel Module Injection.- Leveraging String Kernels for Malware Detection.- Insiders Trapped in the Mirror Reveal Themselves in Social Media.- System Security: Applications Security On Business Logic Vulnerabilities Hunting: The APP LogGIC Framework.- Using the Smart Card Web Server in Secure Branchless Banking.- Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach.- Efficient and Private Three-Party Publish/Subscribe.- System Security: Security Algorithms and Systems Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks.- Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform.- Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines.- JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms.- Forward Secure Certificateless Proxy Signature Scheme.- Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP.- On the Security of an Efficient Attribute-Based Signature.- Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method.- Performance Prediction Model for Block Ciphers on GPU Architectures.- Threshold-Oriented Optimistic Fair Exchange.- Secure Storage and Fuzzy Query over Encrypted Databases.- A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.- Privacy Preserving Context Aware Publish Subscribe Systems.- A New Unpredictability-Based RFID Privacy Model.- Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption.- Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.- Key Agreement and Distribution Light Weight Network Coding Based Key Distribution Scheme for MANETs.- Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network.- Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards.- An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks.- Human Identification with Electroencephalogram (EEG) for the Future Network Security.- Building Better Unsupervised Anomaly Detector with S-Transform.- Fault-Tolerant Topology Control Based on Artificial Immune in WMNs.- Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens.- On the Use of Key Assignment Schemes in Authentication Protocols.- On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems.- Security Authentication of AODV Protocols in MANETs.- Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach.- Towards a Privacy-Preserving Solution for OSNs.- Measuring and Comparing the Protection Quality in Different Operating Systems.- Collusion-Resistant Domain-Specific Pseudonymous Signatures.- On the Applicability of Tim
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
Есть вопрос?
Политика конфиденциальности
Помощь
Дистрибьюторы издательства "Логосфера"
О компании
Представительство в Казахстане
Medpublishing.ru
В Контакте
В Контакте Мед
Мобильная версия