|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Janusz S. Kowalik , Janusz Gorski , Anatoly SachenkoPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2005 ed. Volume: 196 Dimensions: Width: 21.60cm , Height: 2.00cm , Length: 27.90cm Weight: 1.220kg ISBN: 9781402033803ISBN 10: 140203380 Pages: 382 Publication Date: 19 May 2005 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsGeneral Security Issues.- IT Security Development.- A Case for Public and Private Review of Developing it Security Standards.- Assuring Critical Information Infrastructure.- Systemic Challenges for Critical Information Infrastructure Protection.- Decentralized Energy Supply to Secure Computer Systems.- Dependability.- Safety Analysis Methods—Software Development Questions.- Trust Case—A Case for Trustworthiness of IT Infrastructures.- Dependability, Structure, and Infrastructure.- Design for Safety and Security of Complex Embedded Systems: A Unified Approach.- Networks.- Design of Distributed Sensor Networks for Security and Defense.- A Distributed Approach to the Recognition of Geographically Located IP Devices.- Situational Awareness and Network Traffic Analysis.- Early Warning Information Systems and Secure Access Control.- Honeynets: Foundations for the Development of Early Warning Information Systems.- IRIS Biometrics for Secure Remote Access.- New Directions in Access Control.- Cryptography.- Improved Block Cipher Counter Mode of Operation Schemes.- Electronic Signature in Real World.- A Note on Two Significant Developments in Cyberspace Security and Defense.- A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol.- Intrusion Detection.- An Infrastructure for Distributed Event Acquisition.- Some Aspects of Neural Network Approach for Intrusion Detection.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |