Innovative Solutions for Access Control Management, Ahmad Kamran Malik, Adeel Anjum, Basit Raza
Автор: Messaoud Benantar Название: Access Control Systems ISBN: 1441934731 ISBN-13(EAN): 9781441934734 Издательство: Springer Рейтинг: Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Foundations of Security and Access Control in Computing.- to Identity-Management Models.- Elements of Trust Paradigms in Computing.- Mandatory-Access-Control Model.- Discretionary-Access Control and the Access-Matrix Model.- The Take-Grant Protection Model.- The Schematic-Protection Model.- Role-Based Access Control.
Описание: Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use.Security Solutions and Applied Cryptography in Smart Grid Communications is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is ideally designed for academicians, researchers, engineers and students seeking current research on ways in which to implement smart grid platforms all over the globe.
Автор: Kannan Balasubramanian, K. Mala, M. Rajakan Название: Cryptographic Solutions for Secure Online Banking and Commerce ISBN: 1522502734 ISBN-13(EAN): 9781522502739 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 29106.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: "This book discusses the challenges of providing security for online applications and transactions, highlighting research on digital signatures, public key infrastructure, encryption algorithms, and digital certificates, as well as other e-commerce protocols"--
Автор: Nora Cuppens-Boulahia; Costas Lambrinoudakis; Fr?d Название: Security of Industrial Control Systems and Cyber-Physical Systems ISBN: 3319614363 ISBN-13(EAN): 9783319614366 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Management of cyber security in industrial control systems and cyber-physical systems.- Security monitoring.- Trust management.- Security policies and measures.
Автор: Anne V. D. M. Kayem; Selim G. Akl; Patrick Martin Название: Adaptive Cryptographic Access Control ISBN: 1461426421 ISBN-13(EAN): 9781461426424 Издательство: Springer Рейтинг: Цена: 16070.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents the challenges of designing hierarchical cryptographic key management algorithms to implement adaptive access control in dynamic environments and suggests solutions that will overcome these challenges.
Описание: The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions.
Описание: The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions.
Автор: Elahe Fazeldehkordi Название: A Study of Black Hole Attack Solutions ISBN: 0128053674 ISBN-13(EAN): 9780128053676 Издательство: Elsevier Science Рейтинг: Цена: 8083.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
Описание: <em>Theory and Practice of Cryptography Solutions for Secure Information Systems</em> explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the <em>Advances in Information Security, Privacy, and Ethics series collection</em>.
Описание: Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments.The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.
Автор: Mohammad Tariq Banday Название: Cryptographic Security Solutions for the Internet of Things ISBN: 1522557423 ISBN-13(EAN): 9781522557425 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 28413.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks.Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.
Описание: Safeguarding Our Privacy and Our Values in an Age of Mass SurveillanceAmerica’s mass surveillance programs, once secret, can no longer be ignored. While Edward Snowden began the process in 2013 with his leaks of top secret documents, the Obama administration’s own reforms have also helped bring the National Security Agency and its programs of signals intelligence collection out of the shadows. The real question is: What should we do about mass surveillance?Timothy Edgar, a long-time civil liberties activist who worked inside the intelligence community for six years during the Bush and Obama administrations, believes that the NSA’s programs are profound threat to the privacy of everyone in the world. At the same time, he argues that mass surveillance programs can be made consistent with democratic values, if we make the hard choices needed to bring transparency, accountability, privacy, and human rights protections into complex programs of intelligence collection. Although the NSA and other agencies already comply with rules intended to prevent them from spying on Americans, Edgar argues that the rules—most of which date from the 1970s—are inadequate for this century. Reforms adopted during the Obama administration are a good first step but, in his view, do not go nearly far enough.Edgar argues that our communications today—and the national security threats we face—are both global and digital. In the twenty first century, the only way to protect our privacy as Americans is to do a better job of protecting everyone’s privacy. Beyond Surveillance: Privacy, Mass Surveillance, and the Struggle to Reform the NSA explains both why and how we can do this, without sacrificing the vital intelligence capabilities we need to keep ourselves and our allies safe. If we do, we set a positive example for other nations that must confront challenges like terrorism while preserving human rights. The United States already leads the world in mass surveillance. It can lead the world in mass surveillance reform.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru