Описание: This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009.
Автор: Liu Название: Information Security and Privacy ISBN: 3319402528 ISBN-13(EAN): 9783319402529 Издательство: Springer Рейтинг: Цена: 10342.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security;
Автор: Tryfonas Название: Human Aspects of Information Security, Privacy, and Trust ISBN: 3319393804 ISBN-13(EAN): 9783319393803 Издательство: Springer Рейтинг: Цена: 7826.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
User Identification Using Games.- Hermes: Hands-Free Authentication in Physical Spaces.- Implicit Authentication for Mobile Devices Using Typing Behavior.- Fraud Protection for Online Banking - A User-Centered Approach on Detecting Typical Double-Dealings due to Social Engineering and Inobservance whilst Operating with Personal Login Credentials.- Vibration Based Tangible Tokens for Intuitive Pairing among Smart Devices.- Anonymous Authentication with a Bi-directional Identity Federation in the Cloud.- An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010:2011.- Secure Communication Protocol between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks.- Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia's Personal Health Information Act.- Information Security Application Design: Understanding Your Users.- Responsibility Modelling and Its Application Trust Management.- Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks.- Current Trend of End-users' Behaviors towards Security Mechanisms.- Share to Protect - Quantitative Study on Privacy Issues in V2X-Technology.- The Impact of Security Cues on User Perceived Security in E-Commerce.- Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret: Policy Lessons for Government after the Snowden Leaks.- Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective.- Assessing the Feasibility of Adaptive Security Models for the Internet of Things.- OpenStack Firewall as a Service Rule Analyser.- Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes.- Attack Tree Analysis for Insider Threats on the IoT Using Isabelle.- The State of Near-Field Communication (NFC) on the Android platform.- Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home.- A Taxonomy to Classify Risk End-user Profile in Interaction with the Computing Environment.- Security Middleware Programming Using P4.
Автор: Jones Название: Global Information Warfare ISBN: 1498703259 ISBN-13(EAN): 9781498703253 Издательство: Taylor&Francis Рейтинг: Цена: 19906.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how global information warfare is waged and what must be done to counter its attacks.
In light of increased attacks since 2002, Global Information Warfare: The New Digital Battlefield, Second Edition provides a critical update on the nature and approaches to global information warfare. It focuses on threats, vulnerabilities, attacks, and defenses from the perspectives of various players such as governments, corporations, terrorists, and private citizens.
Upgrades to the Second Edition Include:
Revised discussions of changes and impacts of global information warfare since 2002
Updated analyses of the capabilities of several nation-states as well as nonstate actors
A comprehensive list of incidents that have occurred in the past year to show the scope of the problem of GIW
Discussions of post-9/11 governmental changes and shifting priorities with clearer hindsight than was possible in the first edition
The book underscores how hostile countries, business competitors, terrorists, and others are waging information warfare against adversaries, even from across the globe. It describes attacks on information systems through theft, Internet espionage, deception, and sabotage, and illustrates countermeasures used to defeat these threats.
The second edition of Global Information Warfare contains a wealth of information and detailed analyses of capabilities of contemporary information technology and the capabilities of the individuals and groups who employ it in their respective digital wars. It is a crucial source for gaining the best understanding of the current state of information warfare and the most effective ways to counter it.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru