Information security is receiving a great deal of attention ascomputers increasingly process more...
With the rapid growth in the use of computers to manipulate, process, and reason about multimedia...
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Informat...
New technology is always evolving and companies must haveappropriate security for their business ...
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contr...
This book explores fundamental scientific problems essential for autonomous cyber defense. Specif...
These proceedings contain the papers selected for presentation at the 6th - ternational Conferenc...
Unser bisheriger Preis:ORGPRICE: 117,69 €
This volume contains the papers presented at three workshops embedded in the 19th IFIP Internatio...
Unser bisheriger Preis:ORGPRICE: 155,10 €
Integrity and Internal Control in Information Systems isa state-of-the-art book that establishes ...
This book grew out of a Dagstuhl seminar organized by the volume editors in June 1997. After the ...
This book presents a range of cloud computing security challenges and promising solution paths. T...
Motivation Modem enterprises rely on database management systems (DBMS) to collect, store and man...
Security is probably the most critical factor for the development of the 'Information Society'. E...
Database security is one of the classical topics in the research of information system security. ...
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
The LNCS Journal on Data Semantics is devoted to the presentation of notable work that, in one wa...
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2International Conference(...
Motivation for the book Database security has been gaining a great deal of importance as industry...
Calendar units, such as months and days, clock units, such as hours and seconds, and specialized ...
This book examines different aspects of network security metrics and their application to enterpr...
The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was ...
Motivation for the Book This book seeks to establish the state of the art in the cyber situationa...
Unser bisheriger Preis:ORGPRICE: 149,99 €
Information Hiding: Steganography and Watermarking -Attacks and Countermeasures deals with inform...
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group...
Information security concerns the confidentiality, integrity,and availability of information proc...
This volume gathers the papers presented at three workshops that are embedded in the IFIP Sec Con...
Integrity and Internal Control in Information Systems isa state-of-the-art book that establishes ...
Information Hiding: Steganography and Watermarking -Attacks and Countermeasures deals with inform...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
This Springer Brief examines the tools based on attack graphs that help reveal network hardening ...
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group...
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
Today, when a security incident happens, the top three questions a cyber operation center would a...
The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19...
This edited volume features a wide spectrum of the latest computer science research relating to c...
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Informat...
Unser bisheriger Preis:ORGPRICE: 162,50 €
This book examines different aspects of network security metrics and their application to enterpr...
Motivation for the Book This book seeks to establish the state of the art in the cyber situationa...
Motivation Modem enterprises rely on database management systems (DBMS) to collect, store and man...
This book presents a range of cloud computing security challenges and promising solution paths. T...
This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information S...
Data mining is becoming a pervasive technology in activities as diverse as using historical data ...
The development and integration of integrity and internal control mechanisms into information sys...
These proceedings contain the papers selected for presentation at the 13th European Symposium on ...
Location-based applications refer to those that use location data in a prominent manner. Location...
Unser bisheriger Preis:ORGPRICE: 99,99 €
Data mining is becoming a pervasive technology in activities as diverse as using historical data ...
The development and integration of integrity and internal control mechanisms into information sys...
Information security concerns the confidentiality, integrity,and availability of information proc...