Автор: Alencar, Marcelo S., Название: Cryptography and network security / ISBN: 8770224072 ISBN-13(EAN): 9788770224079 Издательство: Taylor&Francis Рейтинг: Цена: 18374.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: It comprises twelve chapters divided into two parts discussing "Non-neutral Evolution on Human Genes" (Part I) and "Evolution of Modern Human Populations" (Part II.)The most significant feature of this book is the continent-wise discussion of modern human dispersal using human genomic data in Part II.
Автор: John Sammons Название: Information Security and Digital Forensics ISBN: 0128045264 ISBN-13(EAN): 9780128045268 Издательство: Elsevier Science Рейтинг: Цена: 6230.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics.
Автор: Xingming Sun; Alex Liu; Han-Chieh Chao; Elisa Bert Название: Cloud Computing and Security ISBN: 3319486705 ISBN-13(EAN): 9783319486703 Издательство: Springer Рейтинг: Цена: 10342.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions.
Автор: Xingming Sun; Alex Liu; Han-Chien Chao; Elisa Bert Название: Cloud Computing and Security ISBN: 331948673X ISBN-13(EAN): 9783319486734 Издательство: Springer Рейтинг: Цена: 11460.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016.
Описание: This detailed volume and accompanying CD-ROM focus on the set electronic transaction (SET) system and review the fundamentals through to practical instruction on how to develop and implement the entire SET system. The book should be of interest to business executives as well as engineers.
Название: Case Studies in Secure Computing ISBN: 1138034134 ISBN-13(EAN): 9781138034136 Издательство: Taylor&Francis Рейтинг: Цена: 8420.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.
This book examines the growing security attacks and countermeasures in the stand-alone and networking worlds, along with other pertinent security issues. The many case studies capture a truly wide range of secure computing applications. Surveying the common elements in computer security attacks and defenses, the book:
Describes the use of feature selection and fuzzy logic in a decision tree model for intrusion detection
Introduces a set of common fuzzy-logic-based security risk estimation techniques with examples
Proposes a secure authenticated multiple-key establishment protocol for wireless sensor networks
Investigates various malicious activities associated with cloud computing and proposes some countermeasures
Examines current and emerging security threats in long-term evolution backhaul and core networks
Supplies a brief introduction to application-layer denial-of-service (DoS) attacks
Illustrating the security challenges currently facing practitioners, this book presents powerful security solutions proposed by leading researchers in the field. The examination of the various case studies will help to develop the practical understanding required to stay one step ahead of the security threats on the horizon.
This book will help those new to the field understand how to mitigate security threats. It will also help established practitioners fine-tune their approach to establishing robust and resilient security for next-generation computing systems.
Автор: Alani Название: Elements of Cloud Computing Security ISBN: 3319414100 ISBN-13(EAN): 9783319414102 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.
Автор: Mauro Conti; Matthias Schunter; Ioannis Askoxylaki Название: Trust and Trustworthy Computing ISBN: 3319228455 ISBN-13(EAN): 9783319228457 Издательство: Springer Рейтинг: Цена: 7826.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions.
Автор: Joxan Jaffar; Roland H.C. Yap Название: Concurrency and Parallelism, Programming, Networking, and Security ISBN: 3540620311 ISBN-13(EAN): 9783540620310 Издательство: Springer Рейтинг: Цена: 12157.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: These conference papers are organzied into topical sections on algorithms, constraints and logic programming, distributed systems, formal systems, networking and security, programming and systems, and specification and verification.
Автор: Rhoton John Название: Cloud Computing Protected ISBN: 0956355625 ISBN-13(EAN): 9780956355621 Издательство: Неизвестно Рейтинг: Цена: 5511.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Sadkhan Al Maliky & Abbas Название: Multidisciplinary Perspectives In Cryptology And Information Security ISBN: 1466658088 ISBN-13(EAN): 9781466658080 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 35759.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential.Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security. This publication offers a comprehensive, in-depth analysis of encryption solutions and will be of particular interest to IT professionals, cryptologists, and researchers in the field.
Описание: A comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. It explores the differences between the methods, including discussion of their history, the hurdles of international law on cryptographic techniques, and "steganalysis".
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru