0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Security for Wireless Sensor Networks (Hardcover, 2007 ed.): Donggang Liu, Peng Ning Security for Wireless Sensor Networks (Hardcover, 2007 ed.)
Donggang Liu, Peng Ning
R4,305 Discovery Miles 43 050 Ships in 12 - 17 working days

Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations. Security for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well results from recent studies in wireless sensor network security. This volume assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain. Security for Wireless Sensor Networks is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science.

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Hardcover, 2004 ed.): Peng Ning, Sushil Jajodia,... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Hardcover, 2004 ed.)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection complements the protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that the users can understand the security threats and risks and thus be better prepared for future attacks. Intrusion detection techniques are traditionally categorized into two classes: anomaly detection and misuse detection. Anomaly detection is based on the normal behavior of a subject (a user or a system); any action that significantly deviates from the normal behaviour is considered intrusive. Misuse detection catches intrusions in terms of characteristics of known attacks or system vulnerabilities; any action that conforms to the pattern of known attack or vulnerability is considered intrusive. and network based IDSs according to the source of the audit information used by each IDS. Host-based IDSs get audit data from host audit trails and usually aim at detecting attacks against a single host; distributed IDSs gather audit data from multiple hosts and possibly the network and connects the hosts, aiming at detecting attacks involving multiple hosts; network-based IDSs use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modelling requests among co-operative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st ed. 2004)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,430 Discovery Miles 14 300 Ships in 10 - 15 working days

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Security for Wireless Sensor Networks (Paperback, Softcover reprint of hardcover 1st ed. 2007): Donggang Liu, Peng Ning Security for Wireless Sensor Networks (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Donggang Liu, Peng Ning
R4,228 Discovery Miles 42 280 Ships in 10 - 15 working days

This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition in hazardous environments, and includes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks. The book assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain.

Computer Security -- ESORICS 2009 - 14th European Symposium on Research in Computer Security, Saint-Malo, France, September... Computer Security -- ESORICS 2009 - 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings (Paperback, 2009 ed.)
Michael Backes, Peng Ning
R2,914 Discovery Miles 29 140 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009.

The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics.

Information and Communications Security - 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006,... Information and Communications Security - 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings (Paperback, 2006 ed.)
Peng Ning, Ninghui Li
R2,891 Discovery Miles 28 910 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Information and Communications Security, ICICS 2006, held in Raleigh, NC, USA, December 2006. The 22 revised full papers and 17 revised short papers cover security protocols, applied cryptography, access control, privacy and malicious code, network security, systems security, cryptanalysis, applied cryptography and network security, and security implementations.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CoolKids Digital Mid-size 30M WR Watch…
R176 Discovery Miles 1 760
The Girl On the Train
Emily Blunt, Rebecca Ferguson, … Blu-ray disc  (1)
R61 Discovery Miles 610
Rogz Indoor 3D Pod Dog Bed (Petrol/Grey…
R1,775 R859 Discovery Miles 8 590
Angelcare Nappy Bin Refills
R165 R145 Discovery Miles 1 450
EcoFlow Emergency Light (Black)
R17,308 Discovery Miles 173 080
The Expendables 4
Jason Statham, Sylvester Stallone Blu-ray disc R329 Discovery Miles 3 290
Bostik Glue Stick (40g)
R52 Discovery Miles 520
Marvel Spiderman Fibre-Tip Markers (Pack…
R57 Discovery Miles 570
The Garden Within - Where the War with…
Anita Phillips Paperback R329 R239 Discovery Miles 2 390
Braai
Reuben Riffel Paperback R495 R359 Discovery Miles 3 590

 

Partners