- 5 Ergebnisse
Kleinster Preis: € 24,88, größter Preis: € 80,24, Mittelwert: € 55,78
1
Bestellen
bei booklooker.de
€ 80,24
Versand: € 0,001
Bestellengesponserter Link
Bagchi, Aditya (Hrsg.) / Bagchi, Aditya / Atluri, Vijayalakshmi (Hrsg.) / Atluri, Vijayalakshmi:

Security and Cryptology: Information Systems Security - Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings - Taschenbuch

2006, ISBN: 9783540689621

[ED: Taschenbuch / Paperback], [PU: Springer, Berlin], AUSFÜHRLICHERE BESCHREIBUNG: This book constitutes the refereed proceedings of the Second International Conference on Information Sy… Mehr…

Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Syndikat Buchdienst
2
Information Systems Security: Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings (Lecture Notes in Computer Science, 4332)
Bestellen
bei amazon.com
$ 27,49
(ca. € 24,88)
Versand: € 15,341
Bestellengesponserter Link
Information Systems Security: Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings (Lecture Notes in Computer Science, 4332) - Taschenbuch

2006, ISBN: 9783540689621

Editor: Bagchi, Aditya, Editor: Atluri, Vijayalakshmi, Springer, Paperback, Auflage: 2006, 400 Seiten, Publiziert: 2006-12-07T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: Illustrations… Mehr…

Gut Versandkosten:In Stock. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 15.34) College-Books-Direct
3
Information Systems Security: Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings (Lecture Notes in Computer Science, 4332)
Bestellen
bei amazon.com
$ 48,39
(ca. € 43,79)
Versand: € 15,341
Bestellengesponserter Link
Information Systems Security: Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings (Lecture Notes in Computer Science, 4332) - Taschenbuch

2006

ISBN: 9783540689621

Editor: Bagchi, Aditya, Editor: Atluri, Vijayalakshmi, Springer, Paperback, Auflage: 2006, 400 Seiten, Publiziert: 2006-12-07T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: Illustrations… Mehr…

Versandkosten:Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 15.34)
4
Information Systems Security: Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings (Lecture Notes in Computer Science, 4332)
Bestellen
bei amazon.com
$ 54,99
(ca. € 49,76)
Bestellengesponserter Link
Information Systems Security: Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings (Lecture Notes in Computer Science, 4332) - Taschenbuch

2006, ISBN: 9783540689621

Editor: Bagchi, Aditya, Editor: Atluri, Vijayalakshmi, Springer, Paperback, Auflage: 2006, 400 Seiten, Publiziert: 2006-12-07T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: Illustrations… Mehr…

Versandkosten:Available to ship in 1-2 days, Lieferung von Amazon., zzgl. Versandkosten Amazon.com
5
Information Systems Security - Aditya Bagchi; Vijayalakshmi Atluri
Bestellen
bei lehmanns.de
€ 80,24
Versand: € 0,001
Bestellengesponserter Link
Aditya Bagchi; Vijayalakshmi Atluri:
Information Systems Security - Taschenbuch

2006, ISBN: 9783540689621

Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, 2006, Softcover, Buch, [PU: Springer Berlin]

Versandkosten:Versand in 10-14 Tagen, , Versandkostenfrei innerhalb der BRD. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch
Information Systems Security: Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings (Lecture Notes in Computer Science, 4332)

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security.

Detailangaben zum Buch - Information Systems Security: Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings (Lecture Notes in Computer Science, 4332)


EAN (ISBN-13): 9783540689621
ISBN (ISBN-10): 3540689621
Taschenbuch
Erscheinungsjahr: 2006
Herausgeber: Springer
404 Seiten
Gewicht: 0,608 kg
Sprache: eng/Englisch

Buch in der Datenbank seit 2007-05-24T09:51:08+02:00 (Vienna)
Detailseite zuletzt geändert am 2024-01-02T13:51:12+01:00 (Vienna)
ISBN/EAN: 9783540689621

ISBN - alternative Schreibweisen:
3-540-68962-1, 978-3-540-68962-1
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: atluri, bagchi
Titel des Buches: information security, information systems, kolkata, proceedings international conference, proceedings all india


Daten vom Verlag:

Autor/in: Aditya Bagchi; Vijayalakshmi Atluri
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information Systems Security - Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings
Verlag: Springer; Springer Berlin
384 Seiten
Erscheinungsjahr: 2006-12-07
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XVI, 384 p.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Alignment; Code; Ethernet; Information; RSA cryptosystem; access control; authorization; broadcast encryption; interoperability; networks; organization; privacy; security; storage security; trust; Cryptology; Computer Communication Networks; Data and Information Security; Computers and Society; IT Operations; Information Storage and Retrieval; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Computersicherheit; Netzwerksicherheit; Digital- und Informationstechnologien: soziale und ethische Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; Informationsrückgewinnung, Information Retrieval; Data Warehousing; EA

Invited Papers.- Privacy in the Electronic Society.- A Data Sharing Agreement Framework.- Password Exhaustion: Predicting the End of Password Usefulness.- Network Monitoring for Security and Forensics.- Data and Application Security.- Fairness Strategy for Multilevel Secure Concurrency Control Protocol.- Optimistic Anonymous Participation in Inter-organizational Workflow Instances.- O2O: Virtual Private Organizations to Manage Security Policy Interoperability.- Privacy Preserving Web-Based Email.- Access Control.- Context-Aware Provisional Access Control.- LRBAC: A Location-Aware Role-Based Access Control Model.- Extending Context Descriptions in Semantics-Aware Access Control.- Specification and Realization of Access Control in SPKI/SDSI.- Key Management and Security in Wireless Networks.- Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack.- An Efficient Key Assignment Scheme for Access Control in a Hierarchy.- Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers.- Secure Data Management in Reactive Sensor Networks.- Threat Analysis, Detection and Recovery.- Security Ontology: Simulating Threats to Corporate Assets.- Two-Stage Credit Card Fraud Detection Using Sequence Alignment.- New Malicious Code Detection Using Variable Length n-grams.- A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes.- Cryptography and Encryption.- An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack.- A Partial Image Encryption Method with Pseudo Random Sequences.- High Capacity Lossless Data Hiding.- An Implementation and Evaluation of Online Disk Encryption for Windows Systems.- Short Papers and Research Reports.- Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract).- A Survey of Control-Flow Obfuscations.- Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments.- Secure Itineraries Framework for Mobile Agent Systems.- Malafide Intension Based Detection of Privacy Violation in Information System.- Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report).- Towards a Formal Specification Method for Enterprise Information System Security.- Recent Research on Privacy Preserving Data Mining.

< zum Archiv...