Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement. Highligh...

Celý popis

Uloženo v:
Podrobná bibliografie
Další autoři: Lee, D. T (Editor)
Shieh, S. P (Editor)
Tygar, J. D (Editor)
Korporace: SpringerLink (online služba) (Distributor) 
Médium: E-kniha
Jazyk:angličtina
Vydáno: Boston, MA : Springer US, 2005
Žánr/forma:elektronické knihy
ISBN:9780387240060
On-line přístup:Plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
Obálka
LEADER 04565nam a22004575i 4500
001 001810657
003 CZ PrSTK
005 20181112141400.0
006 m f d
007 cr nn 008mamaa
008 100301s2005 xxu| s |||| 0|eng d
020 |a 9780387240060  |9 978-0-387-24006-0 
024 7 |a 10.1007/b104203  |2 doi 
040 |a DE-He213  |b cze  |d ABA013  |e rda 
050 4 |a QA76.9.D335 
245 1 0 |a Computer Security in the 21st Century /  |c edited by D. T. Lee, S. P. Shieh, J. D. Tygar 
264 1 |a Boston, MA :  |b Springer US,  |c 2005 
300 |a 1 online zdroj (XII, 268 p. 77 illus.) 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
505 0 |a Security Protocol Design -- Challenges in Protocol Design and Analysis -- Private Matching -- Authentication Protocol Analysis -- Self-Certified Approach for Authenticated Key Agreement -- P2P and Ad Hoc Networks -- Experimenting with Admission Control in P2P Networks -- Adaptive Random Key Distribution Schemes for Wireless Sensor Networks -- Intrusion Detection, Defense, Measurement -- Measuring Relative Attack Surfaces -- A Modeling of Intrusion Detection Systems with Identification Capability -- A Source-End Defense System Against DDoS Attacks -- Beagle: Tracking System Failures for Reproducing Security Faults -- Multimedia Security -- Web Application Security-Past, Present, and Future -- Securing JPEG2000 Code-Streams -- A Secret Information Hiding Scheme Based on Switching Tree Coding 
520 |a Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement. Highlights include presentations of : * Fundamental new security * Cryptographic protocols and design, * A new way of measuring network vulnerability: attack surfaces, * Network vulnerability and building impenetrable systems, * Multimedia content protection including a new standard for photographic images, JPEG2000. Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns. ABOUT THE AUTHORS D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security. S. P. Shieh is a Professor and former Chair of the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems. J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley. He served as chair of the Defense Department's Study Group on Security with Privacy. He works in the areas of computer security, privacy, and electronic commerce. His current research includes strong privacy protections, security issues in sensor webs, and digital rights management. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
659 0 |a Data encryption (Computer science) 
659 0 |a Computer Communication Networks 
659 0 |a Data structures (Computer scienc 
659 0 |a Telecommunication 
659 1 4 |a Cryptology  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
659 2 4 |a Computer Communication Networks  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
659 2 4 |a Data Structures and Information Theory  |0 http://scigraph.springernature.com/things/product-market-codes/I15009 
659 2 4 |a Data Structures  |0 http://scigraph.springernature.com/things/product-market-codes/I15017 
659 2 4 |a Communications Engineering, Networks  |0 http://scigraph.springernature.com/things/product-market-codes/T24035 
700 1 |a Lee, D. T  |4 edt 
700 1 |a Shieh, S. P  |4 edt 
700 1 |a Tygar, J. D  |4 edt 
710 2 |a SpringerLink (online služba)  |7 ntk2018999494  |4 dst 
776 0 8 |i Tištěné vydání :  |t Computer Security in the 21st Century 
856 4 0 |u https://doi.org/10.1007/b104203  |y Plný text 
910 |a ABA013 
950 |a Springer  |b Computer Science 2015