Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Privacy, Security, and Trust in KDD, Francesco Bonchi; Elena Ferrari; Wei Jiang; Bradle


Варианты приобретения
Цена: 9781.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Francesco Bonchi; Elena Ferrari; Wei Jiang; Bradle
Название:  Privacy, Security, and Trust in KDD
ISBN: 9783642017179
Издательство: Springer
Классификация:

ISBN-10: 3642017177
Обложка/Формат: Paperback
Страницы: 136
Вес: 0.23 кг.
Дата издания: 2009
Серия: Lecture notes in computer science / security and cryptology
Язык: English
Иллюстрации: Illustrations
Размер: 240 x 183 x 9
Читательская аудитория: Professional & vocational
Подзаголовок: Second acm sigkdd international workshop, pinkdd 2008, las vegas, nevada, august 24, 2008, revised selected papers
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: Constitutes the refereed post-workshop proceedings of the Second International Workshop on Privacy, Security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008.


Proceedings of the International Conference on IT Convergence and Security 2011

Автор: Kuinam J. Kim; Seong Jin Ahn
Название: Proceedings of the International Conference on IT Convergence and Security 2011
ISBN: 9400798636 ISBN-13(EAN): 9789400798632
Издательство: Springer
Рейтинг:
Цена: 21661.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Part 1. Security Fundamentals

A Secure Service Framework for handling Security Critical Data on the Public Cloud; Gi-Hwan Cho

The Understanding of Building Trust Model on Smartphone Application: Focusing on Users' Motivation; Hun Choi

Towards Understanding Deterrence: Information Security Managers' Perspective; Sangseo Park

Part 2. Industrial & Business Information Security

Idea Sketch to Attribute-Based Access Control in Cloud Computing Environment; ByungRae Cha

Realizing Security Requirements with Physical Properties; Andrй van Cleeff

Controlling Decryption of Personal Health Records in the Cloud; Yi-Chang Hsu

Access Control Mechanism for XML Document; Sun-Moon Jo

A Collaborative Intrusion Detection System Framework for Cloud Computing; Doan Nguyen Man

Criteria for Comparing Nations Cyberwar Capability; Hyung-Jun Seo

Part 3. Security Protocols and Applications

A RSSI-based approach for Localization of Wireless Sensor Network in Indoor; Hyochang Ahn

Semantic Search and Retrieval System for Learning Objects; Arshad Awan

Wear Leveling for PCM Using Hot Data Identification; Inhwan Choi

Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine; Jae Hyeok Jang

HARD: Host-Level Address Remapping Driver for Solid-State Disk; Young-Joon Jang

Ubiquitous based Personalized Hypertension Monitoring System; Jonghun Kim

Customized IPTV Content Recommendation Service Model Based On Personal Preference; Si-Jung Kim

A Study on the Touch Processes of Android Smartphone on Froyo and Gingerbread; Yeong-Gyu Lim

Case Study of QoS-assured Convergence Service Overlay in Open Service Platform Environment; Nam-Kyung Lee

Aspect Oriented Software Development using Requirement Engineering; Seung-Hyung Lee

Accelerometer-based Physical Activity Measurement; Yao Meng

A Group Data Synchronization Protocol in Mobile Environments; Ju-Geon Pak

Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics; Kee-Hyun Park

Part 4. Convergence Security

A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications; In-Pyo Cho

An Efficient Live Stream Community Management Scheme for the Mobile Environment; Chung-Pyo Hong

Unclogging the libjpeg performance bottleneck: a stream-parallel DCT retro-fitted with sequential legacy code; Jingun Hong

Development of Real-time Gesture Recognition System using Visual Interaction; Sung Kwan Kang

Architecture of Image Encryption hardware using Two dimensional Cellular Automata; Abdul Raouf Khan

Simulation of 3D Information Visualization; Gui-Jung Kim

Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks; Kyu Chul Kim

Development of Real-time Location-based Multimedia Style Slop Information Retrieval System; Sung-Ho Kim

Augmented Reality-Based Role-Playing Contents for Education; Sukhyun Lim

Vertex Propagation for Fast Ray-casting of Digital Elevation Model; Eun-Seok Lee

A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization; Kyuho Lee

Image Registration for Sub-Pixel Using Pyramid Edge Images; Jae-Young Lee

Real-time Camera Tracking Using Planar Object Detection; Ahr-Hyun Lee

Performance Analysis of Routing Methods over Mobile IPv6 Networks; Reza Malekian

Robust Estimation of Heights of Moving People using a Single Camera; Sang-Wook Park

Part 5. IT Convergence Applications

Intelligence and Security Informatics

Автор: Daniel Ortiz-Arroyo; Henrik Legind Larsen; Daniel
Название: Intelligence and Security Informatics
ISBN: 3540898999 ISBN-13(EAN): 9783540898993
Издательство: Springer
Рейтинг:
Цена: 9781.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Covers the proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008, held in Esbjerg, Denmark. This book includes such topics as criminal and social network analysis, intelligence analysis and knowledge discovery, Web-based intelligence monitoring and analysis, privacy protection, and access control.

Future Network Systems and Security

Автор: Robin Doss; Selwyn Piramuthu; Wei Zhou
Название: Future Network Systems and Security
ISBN: 3319480200 ISBN-13(EAN): 9783319480206
Издательство: Springer
Рейтинг:
Цена: 8385.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the refereed proceedings of the Second International Conference on Future Network Systems and Security, FNSS 2016, held in Paris, France, in November 2016.The 12 full papers and one short paper presented were carefully reviewed and selected from 34 submissions. The papers focus on the technology, communications, systems and security aspects of relevance to the network of the future.

Visualization for Computer Security

Автор: John R. Goodall; Gregory Conti; Kwan-Liu Ma
Название: Visualization for Computer Security
ISBN: 3540859314 ISBN-13(EAN): 9783540859314
Издательство: Springer
Рейтинг:
Цена: 9781.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Constitutes the refereed proceedings of the 5th International Workshop on Visualization for Cyber Security held on September 15, 2008, in Cambridge, Massachusetts, USA, in conjunction with the 11th International Symposium on Recent Advances in Intrusion Detection (RAID). This book presents 18 reviewed and selected papers from 27 submissions.

Elements of Cloud Computing Security

Автор: Alani
Название: Elements of Cloud Computing Security
ISBN: 3319414100 ISBN-13(EAN): 9783319414102
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия