|
Showing 1 - 12 of
12 matches in All Departments
In our world of ever-increasing Internet connectivity, there is an
on-going threat of intrusion, denial of service attacks, or
countless other abuses of computer and network resources. In
particular, these threats continue to persist due to the flaws of
current commercial intrusion detection systems (IDSs). Intrusion
Detection Systems is an edited volume by world class leaders in
this field. This edited volume sheds new light on defense alert
systems against computer and network intrusions. It also covers
integrating intrusion alerts within security policy framework for
intrusion response, related case studies and much more. This volume
is presented in an easy-to-follow style while including a rigorous
treatment of the issues, solutions, and technologies tied to the
field. Intrusion Detection Systems is designed for a professional
audience composed of researchers and practitioners within the
computer network and information security industry. It is also
suitable as a reference or secondary textbook for advanced-level
students in computer science.
This book revises the strategic objectives of Information Warfare,
interpreting them according to the modern canons of information
age, focusing on the fabric of society, the economy, and critical
Infrastructures. The authors build plausible detailed real-world
scenarios for each entity, showing the related possible threats
from the Information Warfare point of view. In addition, the
authors dive into the description of the still open problems,
especially when it comes to critical infrastructures, and the
countermeasures that can be implemented, possibly inspiring further
research in the domain. This book intends to provide a conceptual
framework and a methodological guide, enriched with vivid and
compelling use cases for the readers (e.g. technologists,
academicians, military, government) interested in what Information
Warfare really means, when its lenses are applied to current
technology. Without sacrificing accuracy, rigor and, most
importantly, the big picture of Information Warfare, this book
dives into several relevant and up-to-date critical domains. The
authors illustrate how finance (an always green target of
Information Warfare) is intertwined with Social Media, and how an
opponent could exploit these latter ones to reach its objectives.
Also, how cryptocurrencies are going to reshape the economy, and
the risks involved by this paradigm shift. Even more compelling is
how the very fabric of society is going to be reshaped by
technology, for instance how our democratic elections are exposed
to risks that are even greater than what appears in the current
public discussions. Not to mention how our Critical Infrastructure
is becoming exposed to a series of novel threats, ranging from
state-supported malware to drones. A detailed discussion of
possible countermeasures and what the open issues are for each of
the highlighted threats complete this book. This book targets a
widespread audience that includes researchers and advanced level
students studying and working in computer science with a focus on
security. Military officers, government officials and professionals
working in this field will also find this book useful as a
reference.
With continuous growth in the number of information objects and the
users that can access these objects, ensuring that access is
compliant with company policies has become a big challenge.
Role-based Access Control (RBAC) - a policy-neutral access control
model that serves as a bridge between academia and industry - is
probably the most suitable security model for commercial
applications.Interestingly, role design determines RBAC's cost.
When there are hundreds or thousands of users within an
organization, with individual functions and responsibilities to be
accurately reflected in terms of access permissions, only a
well-defined role engineering process allows for significant
savings of time and money while protecting data and systems.Among
role engineering approaches, searching through access control
systems to find de facto roles embedded in existing permissions is
attracting increasing interest. The focus falls on role mining,
which is applied data mining techniques to automate - to the extent
possible - the role design task.This book explores existing role
mining algorithms and offers insights into the automated role
design approaches proposed in the literature. Alongside theory,
this book acts as a practical guide for using role mining tools
when implementing RBAC. Besides a comprehensive survey of role
mining techniques deeply rooted in academic research, this book
also provides a summary of the role-based approach, access control
concepts and describes a typical role engineering process.Among the
pioneering works on role mining, this book blends business elements
with data mining theory, and thus further extends the applications
of role mining into business practice. This makes it a useful guide
for all academics, IT and business professionals.
This book revises the strategic objectives of Information Warfare,
interpreting them according to the modern canons of information
age, focusing on the fabric of society, the economy, and critical
Infrastructures. The authors build plausible detailed real-world
scenarios for each entity, showing the related possible threats
from the Information Warfare point of view. In addition, the
authors dive into the description of the still open problems,
especially when it comes to critical infrastructures, and the
countermeasures that can be implemented, possibly inspiring further
research in the domain. This book intends to provide a conceptual
framework and a methodological guide, enriched with vivid and
compelling use cases for the readers (e.g. technologists,
academicians, military, government) interested in what Information
Warfare really means, when its lenses are applied to current
technology. Without sacrificing accuracy, rigor and, most
importantly, the big picture of Information Warfare, this book
dives into several relevant and up-to-date critical domains. The
authors illustrate how finance (an always green target of
Information Warfare) is intertwined with Social Media, and how an
opponent could exploit these latter ones to reach its objectives.
Also, how cryptocurrencies are going to reshape the economy, and
the risks involved by this paradigm shift. Even more compelling is
how the very fabric of society is going to be reshaped by
technology, for instance how our democratic elections are exposed
to risks that are even greater than what appears in the current
public discussions. Not to mention how our Critical Infrastructure
is becoming exposed to a series of novel threats, ranging from
state-supported malware to drones. A detailed discussion of
possible countermeasures and what the open issues are for each of
the highlighted threats complete this book. This book targets a
widespread audience that includes researchers and advanced level
students studying and working in computer science with a focus on
security. Military officers, government officials and professionals
working in this field will also find this book useful as a
reference.
|
Data Privacy Management and Autonomous Spontaneous Security - 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State
|
R1,556
Discovery Miles 15 560
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed joint post
proceedings of two international workshops, the 7th International
Workshop on Data Privacy Management, DPM 2012, and the 5th
International Workshop on Autonomous and Spontaneous Security,
SETOP 2012, held in Pisa, Italy, in September 2012. The volume
contains 13 full papers selected out of 31 submissions and 3
keynote lectures from the DPM workshop and 10 papers selected among
numerous submissions from the SETOP workshop. The contributions
from DPM cover topics from location privacy, citizens' privacy,
privacy, authentication with anonymity, privacy in distributed
systems, privacy policies, and automated privacy enforcement. The
SETOP contributions provide a unique view of ongoing security
research work in a number of emerging environments that are
becoming part of the global ICT infrastructure, from
content-centric to mobile and wireless networks. Also, some of them
cover the key role of run-time enforcement in process and service
security. The topics of SETOP papers include: security policy
deployment; distributed intrusion detection; autonomous and
spontaneous response; privacy policies; secure localization;
context aware and ubiquitous computing; identity management.
This volume presents the refereed proceedings of the 8th
International ICST Conference on Security and Privacy in
Communication Networks, SecureComm 2012, held in Padua, Italy, in
September 2012. The 21 revised papers included in the volume were
carefully reviewed and selected from 73 submissions. Topics covered
include crypto and electronic money; wireless security; web
security; intrusion detection and monitoring; and anonymity and
privacy.
To defend against computer and network attacks, multiple,
complementary security devices such as intrusion detection systems
(IDSs), and firewalls are widely deployed to monitor networks and
hosts. These various IDSs will flag alerts when suspicious events
are observed. This book is an edited volume by world class leaders
within computer network and information security presented in an
easy-to-follow style. It introduces defense alert systems against
computer and network attacks. It also covers integrating intrusion
alerts within security policy framework for intrusion response,
related case studies and much more.
|
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
|
R2,815
Discovery Miles 28 150
|
Ships in 10 - 15 working days
|
The three volume set LNCS 13554, 13555, 13556 constitutes the
proceedings of the 27th European Symposium on Research in Computer
Security, ESORICS 2022, which took place in September 2022. The
conference took place in Copenhagen, Denmark, in a hybrid mode.The
104 full papers and 6 poster papers presented in these proceedings
were carefully reviewed and selected from 562 submissions. They
were organized in topical sections as follows: Part I: Blockchain
security; privacy; crypto; attacks; sidechannels; Part II:
Anonymity; cloud security; access control; authentication; digital
signatures; IoT security; applications; Part III: Formal analysis;
Web security; hardware security; multiparty computation; ML
techniques; cyber-physical systems security; network and software
security; posters.
|
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
|
R1,696
Discovery Miles 16 960
|
Ships in 10 - 15 working days
|
The three volume set LNCS 13554, 13555, 13556 constitutes the
proceedings of the 27th European Symposium on Research in Computer
Security, ESORICS 2022, which took place in September 2022. The
conference took place in Copenhagen, Denmark, in a hybrid mode.The
104 full papers and 6 poster papers presented in these proceedings
were carefully reviewed and selected from 562 submissions. They
were organized in topical sections as follows: Part I: Blockchain
security; privacy; crypto; attacks; sidechannels; Part II:
Anonymity; cloud security; access control; authentication; digital
signatures; IoT security; applications; Part III: Formal analysis;
Web security; hardware security; multiparty computation; ML
techniques; cyber-physical systems security; network and software
security; posters.
|
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
|
R1,681
Discovery Miles 16 810
|
Ships in 10 - 15 working days
|
The three volume set LNCS 13554, 13555, 13556 constitutes the
proceedings of the 27th European Symposium on Research in Computer
Security, ESORICS 2022, which took place in September 2022. The
conference took place in Copenhagen, Denmark, in a hybrid mode.The
104 full papers and 6 poster papers presented in these proceedings
were carefully reviewed and selected from 562 submissions. They
were organized in topical sections as follows: Part I: Blockchain
security; privacy; crypto; attacks; sidechannels; Part II:
Anonymity; cloud security; access control; authentication; digital
signatures; IoT security; applications; Part III: Formal analysis;
Web security; hardware security; multiparty computation; ML
techniques; cyber-physical systems security; network and software
security; posters.
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings (Paperback, 1st ed. 2021)
Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, …
|
R1,638
Discovery Miles 16 380
|
Ships in 10 - 15 working days
|
This book constitutes seven refereed workshops and symposiums,
SpaCCS Workshops 2020, which are held jointly with the 13th
International Conference on Security, Privacy, and Anonymity in
Computation, Communication, and Storage, SpaCCS 2020, in Nanjing,
China, in December 2020. The 48 papers were carefully reviewed and
selected from 131 submissions and cover a broad range of topics on
security, privacy and anonymity in computation communication, and
storage, including the 11th International Workshop on Trust,
Security and Privacy for Big Data (TrustData 2020), the 10th
International Symposium on Trust, Security and Privacy for Emerging
Applications (TSP 2020), the 9th International Symposium on
Security and Privacy on Internet of Things (SPIoT 2020), the 6th
International Symposium on Sensor-Cloud Systems (SCS 2020), the
Second International Workshop on Communication, Computing,
Informatics and Security (CCIS 2020), the First International
Workshop on Intelligence and Security in Next Generation Networks
(ISNGN 2020), the First International Symposium on Emerging
Information Security and Applications (EISA 2020).
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings (Paperback, 1st ed. 2021)
Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, …
|
R1,583
Discovery Miles 15 830
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 13th
International Conference on Security, Privacy, and Anonymity in
Computation, Communication, and Storage, SpaCCS 2020, held in
Nanjing, China, in December 2020. The 30 full papers were carefully
reviewed and selected from 88 submissions. The papers cover many
dimensions including security algorithms and architectures,
privacy-aware policies, regulations and techniques, anonymous
computation and communication, encompassing fundamental theoretical
approaches, practical experimental projects, and commercial
application systems for computation, communication and storage.
SpaCCS 2020 is held jointly with the 11th International Workshop on
Trust, Security and Privacy for Big Data (TrustData 2020), the 10th
International Symposium on Trust, Security and Privacy for Emerging
Applications (TSP 2020), the 9th International Symposium on
Security and Privacy on Internet of Things (SPIoT 2020), the 6th
International Symposium on Sensor-Cloud Systems (SCS 2020), the 2nd
International Workshop on Communication, Computing, Informatics and
Security (CCIS 2020), the First International Workshop on
Intelligence and Security in Next Generation Networks (ISNGN 2020),
the First International Symposium on Emerging Information Security
and Applications (EISA 2020).
|
|