第 1/1 張圖片

圖片庫
第 1/1 張圖片

有類似物品要出售?
Data and Applications Security XVII: Status and Prospects (IFIP Advances in In..
US $113.06
大約HK$ 878.97
狀況:
“Used Texts May Have Used Book Stickers on the Cover. Used texts may NOT contain supplemental ”... 閱讀更多內容關於物品狀況
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
見面交收或取貨:
可於Dayton, Ohio, 美國免費本地見面交收.
運送:
US $5.99(大約 HK$ 46.57) USPS Media MailTM.
所在地:Dayton, Ohio, 美國
送達日期:
估計於 11月8日 (星期六)至 11月14日 (星期五)之間送達 運送地點 94104
退貨:
不可退貨.
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)
物品細節
- 物品狀況
- 良好
- 賣家備註
- ISBN
- 9781402080692
關於產品
Product Identifiers
Publisher
Springer
ISBN-10
1402080697
ISBN-13
9781402080692
eBay Product ID (ePID)
30872742
Product Key Features
Number of Pages
Xxiii, 404 Pages
Publication Name
Data and Applications Security XVII - Status and Prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6 2003, Estes Park, Colorado, USA
Language
English
Publication Year
2004
Subject
Information Theory, Computer Science, Databases / General
Type
Textbook
Subject Area
Computers
Series
Ifip Advances in Information and Communication Technology Ser.
Format
Hardcover
Dimensions
Item Weight
60.3 Oz
Item Length
9.3 in
Item Width
6.1 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
2004-053849
Dewey Edition
22
Series Volume Number
142
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Information Warfare.- Remote Computer Fingerprinting for Cyber Crime Investigations.- Improving Damage Assessment Efficacy in Case of Frequent Attacks on Databases.- Information Assurance.- Delivering Services with Integrity Guarantees in Survivable Database Systems.- Certifying Data from Multiple Sources.- Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model.- Adapting Query Optimization Techniques for Efficient Alert Correlation.- Security and Privacy.- Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases.- Privacy Under Conditions of Concurrent Interaction with Multiple Parties.- Correlated Data Inference.- Anti-Tamper Databases.- Authorization and Access Control in Distributed Systems.- Administration Rights in the SDSD-System.- Secure Authorisation for Web Services.- A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.- Supporting Delegation in Secure Workflow Management Systems.- Security Technologies for the Internet.- Modifying LDAP to Support PKI.- ECPV: EFficient Certificate Path Validation in Public-Key Infrastructure.- Semantics-Aware Perimeter Protection.- Systematic Development of a Family of Fair Exchange Protocols.- Access Control Models and Technologies.- High-Speed Access Control for XML Documents.- Chinese Wall Security Policy Models.- RBAC Policy Implementation for SQL Databases.- An Administrative Model for Role Graphs.- Safety and Liveness for an RBAC/MAC Security Model.- Schema Based XML Security: RBAC Approach.- Persistent Versus Dynamic Role Membership.- FlexFlow: A Flexible Flow Control Policy Specification Framework.- Key Note.- Data and Applications Security: Past, Present and the Future.- Panel.- Digital Forensics: Operational, Legal and Research Issues.
Synopsis
Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include: -Information Warfare, -Information Assurance, -Security and Privacy, -Authorization and Access Control in Distributed Systems, -Security Technologies for the Internet, -Access Control Models and Technologies, -Digital Forensics. This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security. Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector.
LC Classification Number
QA76.9.D35
賣家提供的物品說明
賣家信用評價 (180)
- i***r (185)- 買家留下的信用評價。過去 1 個月購買已獲認證Beautiful. Fast ship. Well packaged. Very nice seller. 😁 Glad to have this piece! I’ve been looking for one for a while but most Palmero works are overseas. I feel lucky to have found this one in Ohio! Thanks!! ☺️
- m***o (93)- 買家留下的信用評價。過去 6 個月購買已獲認證Great shipping, packaging and value all amazing
- 1***1 (101)- 買家留下的信用評價。過去 6 個月購買已獲認證Prompt shipment. Item as advertised. Pleased with transaction. Recommended seller. A++2 Pairs Men's Plaid Shorts Cargo Flat Front Size 36(#155745721935)

