Udvidet returret til d. 31. januar 2025

Bøger i Advances in Information Security serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  •  
    1.222,95 kr.

    Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together.

  • af Reza Montasari
    1.959,95 - 1.969,95 kr.

  • - Issues and Research
     
    1.106,95 kr.

    Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research.

  • af Charles A. Shoniregun
    1.333,95 - 1.570,95 kr.

    This volume identifies the security problems facing internet communication protocols along with the risks associated with internet connections. It includes a number of different algorithms and protocols to provide a cohesive security framework.

  •  
    1.733,95 kr.

    Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.

  •  
    1.279,95 kr.

    This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience.

  • - Application of Game Theory and Adversarial Modeling
     
    1.103,95 kr.

    Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

  • - Application of Game Theory and Adversarial Modeling
     
    1.269,95 kr.

    Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

  • - Building the Scientific Foundation
     
    1.659,95 kr.

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors.

  • af Vincenzo Piuri, Fabio Scotti & Angelo Genovese
    574,95 - 783,95 kr.

    This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems.

  • - Static and Dynamic Approaches
    af Mohammad Ashiqur Rahman & Ehab S. Al-Shaer
    1.222,95 - 1.288,95 kr.

    The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids.

  • - An Abstraction-Based Approach
    af Sushil Jajodia, Peng Ning & Xiaoyang Sean Wang
    560,95 kr.

    Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems.

  • - Beyond the Hacker
     
    1.366,95 kr.

    This book defines the nature and scope of insider problems as viewed by the financial industry. The book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and a range of topics from critical IT infrastructure to insider threats.

  • - Building the Scientific Foundation
     
    1.396,95 kr.

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors.

  •  
    1.097,95 kr.

    Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together.

  • - Beyond the Hacker
     
    1.106,95 kr.

    This book defines the nature and scope of insider problems as viewed by the financial industry. The book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and a range of topics from critical IT infrastructure to insider threats.

  • - A Framework for Supporting Active Cyber Defense
    af Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, mfl.
    1.687,95 - 1.895,95 kr.

    It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management.

  • - Security Measurements and Metrics
     
    2.197,95 kr.

    Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005).

  •  
    1.749,95 kr.

    This book details the SERENITY approach towards providing security and dependability solutions for dynamic, highly-distributed and heterogeneous systems. It covers the foundations of ambient systems and includes case studies.

  • af José A. Onieva, Javier Lopez & Jianying Zhou
    1.104,95 - 1.366,95 kr.

    The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation.

  • af Dimitris A. Gritzalis
    1.097,95 - 1.333,95 kr.

    Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems.

  • - Concepts and Techniques
    af Ali A. Ghorbani, Wei Lu & Mahbod Tavallaee
    1.578,95 - 1.718,95 kr.

    This is a comprehensive text on intrusion detection. It offers reviews of the fundamentals in the field and covers all the latest developments. Too, it provides case studies at the end of each chapter.

  • af Patrick Traynor, Patrick McDaniel & Thomas La Porta
    1.326,95 kr.

    This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community.

  •  
    1.444,95 kr.

    Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY.

  • - Practice and Theory
     
    1.688,95 kr.

    This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios.Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems.This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.

  • af Charles A. Shoniregun, Kudakwashe Dube & Fredrick Mtenzi
    1.126,95 - 1.172,95 kr.

    The rise of various demands in healthcare is driving innovation in healthcare information management. This book is the first comprehensive exploration into the challenges of e-healthcare information and security policy technologies.

  •  
    1.591,95 kr.

    This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense.

  • af Aggelos Kiayias & Serdar Pehlivanoglu
    1.105,95 - 1.366,95 kr.

    This is a mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. It includes a complete description of broadcast encryption with various revocation and tracing functionalities.

  • af John Aycock
    1.127,95 kr.

    This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students.

  •  
    1.690,95 kr.

    This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes.The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions ¿ this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.