Information security is receiving a great deal of attention ascomputers increasingly process more...
With the rapid growth in the use of computers to manipulate, process, and reason about multimedia...
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Informat...
A rich stream of papers and many good books have been written on cryptography, security, and priv...
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contr...
This book explores fundamental scientific problems essential for autonomous cyber defense. Specif...
These proceedings contain the papers selected for presentation at the 6th - ternational Conferenc...
Unser bisheriger Preis:ORGPRICE: 117,69 €
Integrity and Internal Control in Information Systems isa state-of-the-art book that establishes ...
This book grew out of a Dagstuhl seminar organized by the volume editors in June 1997. After the ...
This book presents a range of cloud computing security challenges and promising solution paths. T...
Security is probably the most critical factor for the development of the 'Information Society'. E...
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
Database security is one of the classical topics in the research of information system security. ...
The LNCS Journal on Data Semantics is devoted to the presentation of notable work that, in one wa...
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2International Conference(...
Motivation for the book Database security has been gaining a great deal of importance as industry...
Calendar units, such as months and days, clock units, such as hours and seconds, and specialized ...
This book examines different aspects of network security metrics and their application to enterpr...
The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was ...
Information Hiding: Steganography and Watermarking -Attacks and Countermeasures deals with inform...
Motivation for the Book This book seeks to establish the state of the art in the cyber situationa...
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group...
This volume gathers the papers presented at three workshops that are embedded in the IFIP Sec Con...
Information Hiding: Steganography and Watermarking -Attacks and Countermeasures deals with inform...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
This Springer Brief examines the tools based on attack graphs that help reveal network hardening ...
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group...
Today, when a security incident happens, the top three questions a cyber operation center would a...
This edited volume features a wide spectrum of the latest computer science research relating to c...
The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19...
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Informat...
Unser bisheriger Preis:ORGPRICE: 163,50 €
This book examines different aspects of network security metrics and their application to enterpr...
Motivation for the Book This book seeks to establish the state of the art in the cyber situationa...
Motivation Modem enterprises rely on database management systems (DBMS) to collect, store and man...
This book presents a range of cloud computing security challenges and promising solution paths. T...
This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information S...
Data mining is becoming a pervasive technology in activities as diverse as using historical data ...
The development and integration of integrity and internal control mechanisms into information sys...
These proceedings contain the papers selected for presentation at the 13th European Symposium on ...
Location-based applications refer to those that use location data in a prominent manner. Location...
Unser bisheriger Preis:ORGPRICE: 99,99 €
Data mining is becoming a pervasive technology in activities as diverse as using historical data ...
The development and integration of integrity and internal control mechanisms into information sys...
Information security concerns the confidentiality, integrity,and availability of information proc...
This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information S...
This book explores fundamental scientific problems essential for autonomous cyber defense. Specif...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
This volume constitutes the thoroughly refereed post-conference proceedings of the Second Interna...