Hasil Pencarian  ::  Kembali

Hasil Pencarian

Ditemukan 122 dokumen yang sesuai dengan query
cover
Mark D. Ryan, editor
This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012. The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are organized in...
Berlin: [Springer-Verlag, ], 2012
e20409871
eBooks  Universitas Indonesia Library
cover
Ling, Dong, editor
This book mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing...
Beijing: [Higher Education Press, ], 2012
e20409957
eBooks  Universitas Indonesia Library
cover
Sara Foresti, editor
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection...
Berlin: [Springer-Verlag, ], 2012
e20410002
eBooks  Universitas Indonesia Library
cover
Roychoudhury, Abhik, editor
This book constitutes the refereed proceedings of the 9th International Colloquium on Theoretical Aspects of Computing, ICTAC 2012 held in Bangalore, India, in September 2012. The 16 revised full papers presented together with the abstracts of three keynote talks were carefully reviewed and selected from 73 submissions. The papers cover...
Berlin: [, Springer-Verlag], 2012
eBooks  Universitas Indonesia Library
cover
Schneider, Thomas, author
The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers...
Berlin: Springer-Verlag, 2012
e20410461
eBooks  Universitas Indonesia Library
cover
Thai, My T., author
Group testing theory in network security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A...
New York: [Springer, ], 2012
e20419267
eBooks  Universitas Indonesia Library
cover
Vacca, John R., editor
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
cover
Andress, Jason, author
Cyber warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and...
Waltham, MA: Syngress, 2014
e20426916
eBooks  Universitas Indonesia Library
cover
Network and system security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors? respective areas of expertise....
Waltham, MA: Syngress, 2014
e20427443
eBooks  Universitas Indonesia Library
cover
Professional penetration testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find...
Waltham, MA: Syngress, 2013
e20427657
eBooks  Universitas Indonesia Library
<<   3 4 5 6 7 8 9 10 11 12   >>