0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Insider Attack and Cyber Security - Beyond the Hacker (Hardcover, 2008 ed.): Salvatore J Stolfo, Steven M. Bellovin, Shlomo... Insider Attack and Cyber Security - Beyond the Hacker (Hardcover, 2008 ed.)
Salvatore J Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, …
R2,667 Discovery Miles 26 670 Ships in 18 - 22 working days

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks.

Insider Attack and Cyber Security - Beyond the Hacker (Paperback, Softcover reprint of hardcover 1st ed. 2008): Salvatore J... Insider Attack and Cyber Security - Beyond the Hacker (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Salvatore J Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, …
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College.

This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks.

Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008,... Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings (Paperback, 2008 ed.)
Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung
R1,471 Discovery Miles 14 710 Ships in 18 - 22 working days

ACNS2008, the6thInternationalConferenceonAppliedCryptographyandN- work Security, was held in New York, New York, June 3-6, 2008, at Columbia University. ACNS 2008 was organized in cooperation with the International - sociation for Cryptologic Research (IACR) and the Department of Computer Science at Columbia University. The General Chairs of the conference were - gelos Keromytis and Moti Yung. The conference received 131 submissions, of which the Program Committee, chairedbyStevenBellovinandRosarioGennaro, selected 30 for presentation at the conference. The Best Student Paper Award was given to Liang Xie and Hui Song for their paper "On the E?ectiveness of Internal Patch Dissemination Against File-Sharing Worms" (co-authored with Sencun Zhu). These proceedings consist of revised versions of the presented papers. The revisions werenot reviewed.The authors bear full responsibility for the contents of their papers. Thereweremany submissionsof goodquality, and consequentlythe selection process was challenging and very competitive. Indeed, a number of good papers were not accepted due to lack of space in the program. The main considerations in selecting the program were conceptual and technical innovation and quality of presentation. As re?ected in the Call for Papers, an attempt was made to solicit and publish papers suggesting novel paradigms, original directions, or non-traditional perspectives.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Shine A Light - In Conversation With…
Corrine Wilson Paperback R349 Discovery Miles 3 490
Broken Country
Clare Leslie Hall Paperback R395 R353 Discovery Miles 3 530
Chrestomathia - Being a Collection of…
Jeremy Bentham Paperback R606 Discovery Miles 6 060
Cornwall Secret and Hidden - A…
Tj Dockree, Cornwall Writers Paperback R503 Discovery Miles 5 030
The Mother Daughter Book Club
Susan Patterson, James Patterson Paperback R395 R315 Discovery Miles 3 150
Usb Complete 5th Edn
Jan Axelson Paperback R1,260 R1,064 Discovery Miles 10 640
Funny Story
Emily Henry Paperback R395 R353 Discovery Miles 3 530
Advanced Database Indexing
Yannis Manolopoulos, Yannis Theodoridis, … Paperback R5,148 Discovery Miles 51 480
Damaged Goods - The Rise and Fall of Sir…
Oliver Shah Paperback  (1)
R289 R264 Discovery Miles 2 640
Great Big Beautiful Life
Emily Henry Paperback R395 R353 Discovery Miles 3 530

 

Partners