0
Your cart

Your cart is empty

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Buy Now

Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 Proceedings (Paperback, 2010 ed.) Loot Price: R3,287
Discovery Miles 32 870
Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25,...

Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 Proceedings (Paperback, 2010 ed.)

Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai

Series: Communications in Computer and Information Science, 89

 (sign in to rate)
Loot Price R3,287 Discovery Miles 32 870 | Repayment Terms: R308 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in the areas of security and its applications, including: * Network and Wireless Network Security * Mobile, Ad Hoc and Sensor Network Security * Peer-to-Peer Network Security * Database and System Security * Intrusion Detection and Prevention * Internet Security, and Applications Security and Network Management * E-mail Security, Spam, Phishing, E-mail Fraud * Virus, Worms, Trojon Protection * Security Threats and Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc. ) * Ubiquitous Computing Security * Web 2. 0 Security * Cryptographic Protocols * Performance Evaluations of Protocols and Security Application There were 182 submissions to the conference and the Program Committee selected 63 papers for publication. The book is organized as a collection of papers from the First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010), the First International Workshop on Database Management Systems (DMS- 2010), and the First International Workshop on Mobile, Wireless and Networks Security (MWNS-2010).

General

Imprint: Springer-Verlag
Country of origin: Germany
Series: Communications in Computer and Information Science, 89
Release date: July 2010
First published: 2010
Editors: Natarajan Meghanathan • Selma Boumerdassi • Nabendu Chaki • Dhinaharan Nagamalai
Dimensions: 235 x 155 x 33mm (L x W x T)
Format: Paperback
Pages: 636
Edition: 2010 ed.
ISBN-13: 978-3-642-14477-6
Categories: Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
Books > Computing & IT > General theory of computing > Data structures
Books > Computing & IT > Computer programming > Algorithms & procedures
Books > Computing & IT > Computer programming > Software engineering
Books > Computing & IT > Internet > Network computers
Books > Computing & IT > Social & legal aspects of computing > Human-computer interaction
Books > Computing & IT > Applications of computing > Databases > General
LSN: 3-642-14477-2
Barcode: 9783642144776

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners