Atjaunināt sīkdatņu piekrišanu

E-grāmata: Threats, Countermeasures, and Advances in Applied Information Security

Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 231,98 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

"This book addresses the fact that managing information security program while effectively managing risks has never been so critical, discussing issues such as emerging threats and countermeasures for effective management of information security in organizations"--Provided by publisher.

The 24 papers in this collection discuss both theoretical aspects of information security management and the real-world implications and implementations of the research. Contributors present tools for privacy risk assessment and compliance, software configuration security appraisal, a proxy smart card system, privacy policy creation and comparison, multi-level information splitting, malware analysis, and decentralized enforcement of network security. Other chapters explore graphical passwords, SQL injection attack countermeasures, scrambled CAPTCHA, collaborative enterprise security, electronic voting systems, and mobile codes for wireless sensor networks. Two of the editors are affiliated with the State University of New York at Buffalo. Annotation ©2012 Book News, Inc., Portland, OR (booknews.com)
Preface xvi
Chapter 1 A Pragmatic Approach to Intrusion Response Metrics
1(22)
Chris Strasburg
Johnny S. Wong
Chapter 2 Feature Extraction Methods for Intrusion Detection Systems
23(30)
Hai Thanh Nguyen
Katrin Franke
Slobodan Petrovic
Chapter 3 A Distributed and Secure Architecture for Signature and Decryption Delegation through Remote Smart Cards
53(13)
Giuseppe Cattaneo
Pompeo Faruolo
Ivan Visconti
Chapter 4 Information Security Management: Awareness of Threats in E-Commerce
66(25)
Mohammad Mahfuzur Rahman
Karim Mohammed Rezaul
Chapter 5 Analyzing Information Security Goals
91(20)
Ella Kolkowska
Karin Hedstrom
Fredrik Karlsson
Chapter 6 Graphical Passwords
111(18)
Luigi Catuogno
Clemente Galdi
Chapter 7 Assessing the Security of Software Configurations
129(29)
Afonso Araujo Neto
Marco Vieira
Chapter 8 A Decision Support System for Privacy Compliance
158(23)
Siani Pearson
Tomas Sander
Chapter 9 Information Security Management Based on Linguistic Sharing Techniques
181(13)
Marek R. Ogiela
Urszula Ogiela
Chapter 10 SQL Injection Attacks Countermeasures
194(20)
Kasra Amirtahmasebi
Seyed Reza Jalalinia
Chapter 11 Security and Authentication Issues of an Embedded System Designed and Implemented for Interactive Internet Users
214(20)
Siddhartha Baruah
Anjana Kakoty Mahanta
Kanak Ch Sarma
Chapter 12 Distributed Key Management Scheme Based on CL-PKC in P2P Networks
234(14)
Zhongwen Li
Zhibin Xu
Chen Liang
Chapter 13 A Privacy Service for Comparison of Privacy and Trust Policies within SOA
248(18)
David S. Allison
Hany F. El Yamany
Miriam A. M. Capretz
Chapter 14 Creating and Applying Security Goal Indicator Trees in an Industrial Environment
266(15)
Alessandra Bagnato
Fabio Raiteri
Christian Jung
Frank Elberzhager
Chapter 15 Security Enhancement of Peer-to-Peer Session Initiation
281(28)
Xianghan Zheng
Vladimir A. Oleshchuk
Chapter 16 Towards a Framework for Collaborative Enterprise Security
309(26)
Janardan Misra
Chapter 17 Privacy-Aware Organisation-Based Access Control Model (PrivOrBAC)
335(26)
Nabil Ajam
Nora Cuppens-Boulahia
Frederic Cuppens
Chapter 18 Can Formal Methods Really Help: Analyzing the Security of Electronic Voting Systems?
361(20)
Komminist Weldemariam
Adolfo Villafiorita
Chapter 19 Countering Spam Robots: Scrambled CAPTCHA and Hindi CAPTCHA
381(13)
Aditya Raj
Tushar Pahwa
Ashish Jain
Chapter 20 Embedded System Security Risk in a Green-House Environment
394(17)
Trailokya Oraon
Chapter 21 Security in Wireless Sensor Networks with Mobile Codes
411(15)
Frantisek Zboril Jr.
Jan Horacek
Martin Drahansky
Petr Hanacek
Chapter 22 Grid of Security: A Decentralized Enforcement of the Network Security
426(18)
Olivier Flauzac
Florent Nolot
Luiz-Angelo Steffenel
Chapter 23 Effective Malware Analysis Using Stealth Breakpoints
444(18)
Amit Vasudevan
Chapter 24 A Dynamic Cyber Security Economic Model: Incorporating Value Functions for All Involved Parties
462(16)
C. Warren Axelrod
Compilation of References 478(32)
About the Contributors 510(13)
Index 523