0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete,... Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Ulrich Flegel, Evangelos Markatos, William Robertson
R1,978 Discovery Miles 19 780 Ships in 10 - 15 working days

This book constitutes the refereed post-proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2012, held in Heraklion, Crete, Greece, in July 2012. The 10 revised full papers presented together with 4 short papers were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on malware, mobile security, secure design, and intrusion detection systems (IDS).

Privacy-Respecting Intrusion Detection (Paperback, Softcover reprint of hardcover 1st ed. 2007): Ulrich Flegel Privacy-Respecting Intrusion Detection (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Ulrich Flegel
R4,216 Discovery Miles 42 160 Ships in 10 - 15 working days

Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.

Detection of Intrusions and Malware, and Vulnerability Assessment - 6th International Conference, DIMVA 2009, Milan, Italy,... Detection of Intrusions and Malware, and Vulnerability Assessment - 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings (Paperback, 2009 ed.)
Ulrich Flegel, Danilo Bruschi
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 6th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Since 2004, DIMVA annually brings together leading researchers and practitioners from academia, government and industry to present and discuss novel security research. DIMVA is organized by the Special Interest Group Security-Intrusion Detection and Response (SIDAR)-of the German Inf- matics Society (GI). The DIMVA 2009 Program Committee received 44 submissions from ind- trial and academic organizations from 17 di?erent countries. Each submission was carefully reviewed by at least three Program Committee members or ext- nal experts. The submissions were evaluated on the basis of scienti?c novelty, importance to the ?eld and technical quality. The ?nal selection took place at the Program Committee meeting held on March 23, 2009, in Brussels, Belgium. Ten full papers and three extended abstracts were selected for presentation and publication in the conference proceedings. TheconferencetookplaceduringJuly9-10,2009,atVillaGallia,LakeComo, Italy, with the program grouped into ?ve sessions. Two keynote speeches were presented by Richard A. Kemmerer (University of California, Santa Barbara) and HenryStern (Ironport/ Cisco).The conferenceprogramwascomplemented by the Capture-the-Flag contest CIPHER (Challenges in Informatics: Progr- ming, Hosting and ExploRing) organized by Lexi Pimenidis (iDev GmbH) and a rump session organized by Sven Dietrich (Stevens Institute of Technology). A successful conference is the result of the joint e?ort of many people. In particular, we would like to thank all the authors who submitted contributions.

Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.): Ulrich Flegel Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.)
Ulrich Flegel
R3,000 Discovery Miles 30 000 Ships in 10 - 15 working days

Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Seed Of A Dream - Morris Isaacson High…
Clive Glaser Paperback R265 R195 Discovery Miles 1 950
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Samsung EO-IA500BBEGWW Wired In-ear…
R299 R199 Discovery Miles 1 990
Hampstead
Diane Keaton, Brendan Gleeson, … DVD R66 Discovery Miles 660
Bug-A-Salt 3.0 Black Fly
 (1)
R999 Discovery Miles 9 990
Hart Easy Pour Kettle (2.5L)
 (2)
R199 R179 Discovery Miles 1 790
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950
Focus Office Desk Chair (Black)
R1,199 R989 Discovery Miles 9 890
A Girl, A Bottle, A Boat
Train CD  (2)
R59 Discovery Miles 590

 

Partners