Proceedings of the 35th Annual Computer Security Applications Conference
Author :
Publisher :
Page : pages
File Size : 20,18 MB
Release : 2019
Category :
ISBN :
Author :
Publisher :
Page : pages
File Size : 20,18 MB
Release : 2019
Category :
ISBN :
Author : David Balenson
Publisher :
Page : 821 pages
File Size : 20,32 MB
Release : 2019
Category :
ISBN : 9781450376280
Author :
Publisher :
Page : pages
File Size : 19,18 MB
Release : 2019
Category : Computer security
ISBN :
Author :
Publisher :
Page : pages
File Size : 42,60 MB
Release : 2018
Category :
ISBN : 9781450365697
Author : Joaquin Garcia-Alfaro
Publisher : Springer Nature
Page : 495 pages
File Size : 24,1 MB
Release :
Category :
ISBN : 3031709039
Author :
Publisher : IEEE Computer Society Press
Page : 438 pages
File Size : 29,52 MB
Release : 2000
Category : Computers
ISBN : 9780769508597
Annotation Forty-four papers from the December 2000 conference address challenges in the field of information security. The main areas of discussion are intrusion detection, security policy, public key infrastructure, access control, security architecture, e-commerce, and cryptography. Topics include extending Java for package-based access control, policy mediation for multi-enterprise environments, binding identities and attributes using digitally signed certificates, using operating system wrappers to increase the resiliency to commercial firewalls, calculating costs for quality of security service, and the Chinese Remainder Theorem and its application in a high-speed RSA crypto chip. No subject index. Annotation copyrighted by Book News, Inc., Portland, OR.
Author : Computer Security Applications Conference
Publisher : Institute of Electrical & Electronics Engineers(IEEE)
Page : 386 pages
File Size : 46,43 MB
Release : 1998
Category : Computers
ISBN :
The proceedings from the December 1998 conference consists of 35 papers, which have been kept in chronological order as they were presented, and provides practical solutions to real security problems. Day one addresses network intrusion detection, security administration, information infrastructure, and Internet technologies. The second day covers legal liability, electronic commerce, architectures, high-speed networks, cryptography, and intrusion detection. Subjects of the final day are digital signatures, assurance, and secure transactions. No index. Annotation copyrighted by Book News, Inc., Portland, OR.
Author : Carrie Gates
Publisher :
Page : 408 pages
File Size : 26,13 MB
Release : 2010
Category : Computer science
ISBN : 9781450301336
Author : Mostafa Al-Emran
Publisher : Springer Nature
Page : 1024 pages
File Size : 23,50 MB
Release : 2021-12-02
Category : Technology & Engineering
ISBN : 3030859908
This book sheds light on the emerging research trends in intelligent systems and their applications. It mainly focuses on four different themes, including Artificial Intelligence and Soft Computing, Information Security and Networking, Medical Informatics, and Advances in Information Systems. Each chapter contributes to the aforementioned themes by discussing the recent design, developments, and modifications of intelligent systems and their applications.
Author : Charles N. Payne
Publisher :
Page : 492 pages
File Size : 24,78 MB
Release : 2014
Category : Computer science
ISBN : 9781450330053