0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Security for Wireless Sensor Networks (Hardcover, 2007 ed.): Donggang Liu, Peng Ning Security for Wireless Sensor Networks (Hardcover, 2007 ed.)
Donggang Liu, Peng Ning
R4,473 Discovery Miles 44 730 Ships in 10 - 15 working days

Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations. Security for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well results from recent studies in wireless sensor network security. This volume assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain. Security for Wireless Sensor Networks is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science.

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Hardcover, 2004 ed.): Peng Ning, Sushil Jajodia,... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Hardcover, 2004 ed.)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,611 Discovery Miles 16 110 Ships in 10 - 15 working days

Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection complements the protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that the users can understand the security threats and risks and thus be better prepared for future attacks. Intrusion detection techniques are traditionally categorized into two classes: anomaly detection and misuse detection. Anomaly detection is based on the normal behavior of a subject (a user or a system); any action that significantly deviates from the normal behaviour is considered intrusive. Misuse detection catches intrusions in terms of characteristics of known attacks or system vulnerabilities; any action that conforms to the pattern of known attack or vulnerability is considered intrusive. and network based IDSs according to the source of the audit information used by each IDS. Host-based IDSs get audit data from host audit trails and usually aim at detecting attacks against a single host; distributed IDSs gather audit data from multiple hosts and possibly the network and connects the hosts, aiming at detecting attacks involving multiple hosts; network-based IDSs use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modelling requests among co-operative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st ed. 2004)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,482 Discovery Miles 14 820 Ships in 10 - 15 working days

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Security for Wireless Sensor Networks (Paperback, Softcover reprint of hardcover 1st ed. 2007): Donggang Liu, Peng Ning Security for Wireless Sensor Networks (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Donggang Liu, Peng Ning
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition in hazardous environments, and includes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks. The book assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain.

Computer Security -- ESORICS 2009 - 14th European Symposium on Research in Computer Security, Saint-Malo, France, September... Computer Security -- ESORICS 2009 - 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings (Paperback, 2009 ed.)
Michael Backes, Peng Ning
R2,999 Discovery Miles 29 990 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009.

The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics.

Information and Communications Security - 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006,... Information and Communications Security - 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings (Paperback, 2006 ed.)
Peng Ning, Ninghui Li
R2,976 Discovery Miles 29 760 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Information and Communications Security, ICICS 2006, held in Raleigh, NC, USA, December 2006. The 22 revised full papers and 17 revised short papers cover security protocols, applied cryptography, access control, privacy and malicious code, network security, systems security, cryptanalysis, applied cryptography and network security, and security implementations.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Jehovah Jireh - God's Providence
William Swan Plumer Paperback R210 Discovery Miles 2 100
Nanostructured Nonlinear Optical…
Rashid A. Ganeev Paperback R4,525 R4,257 Discovery Miles 42 570
South African Artists At Home
Paul Duncan Hardcover  (2)
R375 R109 Discovery Miles 1 090
Introductory Quantum Mechanics - A…
Paul Berman Hardcover R1,981 R1,221 Discovery Miles 12 210
Small Space Living
Christine Brun Hardcover R1,066 R855 Discovery Miles 8 550
Existential Physics - A Scientist’s…
Sabine Hossenfelder Paperback R302 Discovery Miles 3 020
Migrants, Refugees, and Foreign Policy…
Rainer Munz, Myron Weiner Hardcover R3,334 Discovery Miles 33 340
The Physics of Noise
Edoardo Milotti Hardcover R1,498 Discovery Miles 14 980
The English Handbook and Study Guide - A…
Beryl Lutrin Paperback  (1)
R370 R347 Discovery Miles 3 470
Advanced Analytical Methods in Tribology
Martin Dienwiebel, Maria-Isabel De Barros Bouchet Hardcover R4,639 Discovery Miles 46 390

 

Partners