熱門搜尋

    您輸入的關鍵字: Jajodia

    分類(單選)
    配送方式(可複選)
    其他(可複選)
    ~

    搜尋結果共 65 筆, 頁數 1 / 2

    Network Security Metrics

    Network Security Metrics

    • 優惠價: 5999

    Reviews a range of network security models that focus on combining individual metric scores obtained... more

    Cyber Deception: Building the Scientific Foundation

    Cyber Deception: Building the Scientific Foundation

    • 優惠價: 11999

    This edited volume features a wide spectrum of the latest computer science research relating to cybe... more

    Network Security Metrics

    Network Security Metrics

    • 優惠價: 8399

    Reviews a range of network security models that focus on combining individual metric scores obtained... more

    Theory and Models for Cyber Situation Awareness

    Theory and Models for Cyber Situation Awareness

    • 優惠價: 3599

    Today, when a security incident happens, the top three questions a cyber operation center would ask ... more

    How Can You Blame My Innocence for Your Crime

    How Can You Blame My Innocence for Your Crime

    • 優惠價: 523
    Cyber Deception: Building the Scientific Foundation

    Cyber Deception: Building the Scientific Foundation

    • 優惠價: 11999

    This edited volume features a wide spectrum of the latest computer science research relating to cybe... more

    Cyber Warfare: Building the Scientific Foundation

    Cyber Warfare: Building the Scientific Foundation

    • 優惠價: 8399

    This book features a wide spectrum of the latest computer science research relating to cyber warfare... more

    Network Hardening: An Automated Approach to Improving Network Security

    Network Hardening: An Automated Approach to Improving Network Security

    • 優惠價: 3299

    This Springer Brief examines the tools based on attack graphs that help reveal network hardening thr... more

    Secure Cloud Computing

    Secure Cloud Computing

    • 優惠價: 6599

    . In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments...... more

    Computer Security - ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Pro

    Computer Security - ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Pro

    • 優惠價: 3299

    This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ... more

    Intrusion Detection in Distributed Systems: An Abstraction-Based Approach

    Intrusion Detection in Distributed Systems: An Abstraction-Based Approach

    • 優惠價: 3299

    Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanis... more

    Multilevel Secure Transaction Processing

    Multilevel Secure Transaction Processing

    • 優惠價: 10199

    Information security is receiving a great deal of attention as computers increasingly process more a... more

    Moving Target Defense II: Application of Game Theory and Adversarial Modeling

    Moving Target Defense II: Application of Game Theory and Adversarial Modeling

    • 優惠價: 6599

    Covers recent breakthroughs, accomplishments and future research in Moving Target Defense Presents a... more

    Cyber Situational Awareness: Issues and Research

    Cyber Situational Awareness: Issues and Research

    • 優惠價: 6599

    Motivation for the Book This book seeks to establish the state of the art in the cyber situational a... more

    Information Systems Security: 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings

    Information Systems Security: 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings

    • 優惠價: 3299

    This book constitutes the refereed proceedings of the 7th International Conference on Information Sy... more

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats

    • 優惠價: 8399

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of... more

    Trusted Recovery and Defensive Information Warfare

    Trusted Recovery and Defensive Information Warfare

    • 優惠價: 6599

    Information security concerns the confidentiality, integrity, and availability of information proces... more

    Time Granularities in Databases, Data Mining, and Temporal Reasoning

    Time Granularities in Databases, Data Mining, and Temporal Reasoning

    • 優惠價: 3299

    Calendar units, such as months and days, clock units, such as hours and seconds, and specialized uni... more

    Preserving Privacy in On-Line Analytical Processing (Olap)

    Preserving Privacy in On-Line Analytical Processing (Olap)

    • 優惠價: 10140

    Addresses the privacy issue of On-Line Analytic Processing systems Details how to keep the performan... more

    Handbook of Database Security: Applications and Trends

    Handbook of Database Security: Applications and Trends

    • 優惠價: 7199

    This handbook provides an up-to-date overview of data security models, techniques, and architectures... more

    Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 20

    Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 20

    • 優惠價: 6599

    These proceedings contain the papers selected for presentation at the 6th - ternational Conference o... more

    Data and Applications Security and Privacy XXIV: 24th Annual Ifip Wg 11.3 Working Conference Rome, Italy, June 21-23, 2010 Proce

    Data and Applications Security and Privacy XXIV: 24th Annual Ifip Wg 11.3 Working Conference Rome, Italy, June 21-23, 2010 Proce

    • 優惠價: 3299

    This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and... more

    Cyber Situational Awareness: Issues and Research

    Cyber Situational Awareness: Issues and Research

    • 優惠價: 6599

    Motivation for the Book This book seeks to establish the state of the art in the cyber situational a... more

    Privacy in Location-based Applications: Research Issues and Emerging Trends

    Privacy in Location-based Applications: Research Issues and Emerging Trends

    • 優惠價: 3299

    Location-based applications refer to those that use location data in a prominent manner. Location da... more

    Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP Sec’0

    Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP Sec’0

    • 優惠價: 10199

    These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information... more

    Handbook of Database Security

    Handbook of Database Security

    • 優惠價: 10199

    This handbook provides an up-to-date overview of data security models, techniques, and architectures... more

    Secure Data Management in Decentralized Systems

    Secure Data Management in Decentralized Systems

    • 優惠價: 10000

    The field of database security has expanded greatly, due to the rapid development of the global inte... more

    Preserving Privacy in On-Line Analytical Processing (OLAP)

    Preserving Privacy in On-Line Analytical Processing (OLAP)

    • 優惠價: 8000

    Addresses the privacy issue of On-Line Analytic Processing systems Details how to keep the performan... more

    Data And Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data And Applications Security, Storrs, CT, U

    Data And Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data And Applications Security, Storrs, CT, U

    • 優惠價: 5450

    The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was hel... more

    Information Security Management, Education And Privacy

    Information Security Management, Education And Privacy

    • 優惠價: 9000

    Information Security Management, Education and Privacy Edited by Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, and...... more

    Intrusion Detection in Distributed Systems: An Abstraction-Based Approach

    Intrusion Detection in Distributed Systems: An Abstraction-Based Approach

    • 優惠價: 3299

    Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanis... more

    Applications of Data Mining in Computer Security

    Applications of Data Mining in Computer Security

    • 優惠價: 9000

    Data mining is becoming a pervasive technology in activities as diverse as using historical data to ... more

    Trusted Recovery and Defensive Information Warfare

    Trusted Recovery and Defensive Information Warfare

    • 優惠價: 6599
    Conceptual Modeling-Er 2001: 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 2001 : Proceedings

    Conceptual Modeling-Er 2001: 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 2001 : Proceedings

    • 優惠價: 7450

    This book constitutes the refereed proceedings of the 20th International Conference on Conceptual Mo... more

    Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures

    Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures

    • 優惠價: 6599
    Time Granularities in Databases, Data Mining, and Temporal Reasoning

    Time Granularities in Databases, Data Mining, and Temporal Reasoning

    • 優惠價: 3299

    Calendar units, such as months and days, clock units, such as hours and seconds, and specialized uni... more

    Multilevel Secure Transaction Processing

    Multilevel Secure Transaction Processing

    • 優惠價: 10199

    Information security is receiving a great deal of attention as computers increasingly process more a... more

    Temporal Databases: Research and Practice

    Temporal Databases: Research and Practice

    • 優惠價: 5950

    This book grew out of a Dagstuhl seminar organized by the volume editors in June 1997. After the sem... more

    Advanced Transaction Models and Architectures

    Advanced Transaction Models and Architectures

    • 優惠價: 12950

    Motivation Modem enterprises rely on database management systems (DBMS) to collect, store and manage... more

    Adaptive Autonomous Secure Cyber Systems

    Adaptive Autonomous Secure Cyber Systems

    • 優惠價: 10740

    1 Describes the latest work on the attribution problem to help identify culprits of cyber-attacks 2 ... more

    Adaptive Autonomous Secure Cyber Systems

    Adaptive Autonomous Secure Cyber Systems

    • 優惠價: 10799

    1 Describes the latest work on the attribution problem to help identify culprits of cyber-attacks 2 ... more

    Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- And Game-Theoretic Approaches to Cyber Security

    Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- And Game-Theoretic Approaches to Cyber Security

    • 優惠價: 3899

    Today’s cyber defenses are largely static allowing adversaries to pre-plan their attacks. In respons... more

    Cyber Warfare: Building the Scientific Foundation

    Cyber Warfare: Building the Scientific Foundation

    • 優惠價: 8399

    This book features a wide spectrum of the latest computer science research relating to cyber warfare... more

    Graphical Models for Security: Second International Workshop, Gramsec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers

    Graphical Models for Security: Second International Workshop, Gramsec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers

    • 優惠價: 2699

    This volume constitutes the thoroughly refereed post-conference proceedings of the Second Internatio... more

    Information Security Theory and Practice: 9th Ifip Wg 11.2 International Conference, Wistp 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceed

    Information Security Theory and Practice: 9th Ifip Wg 11.2 International Conference, Wistp 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceed

    • 優惠價: 3299

    This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(fo... more

    Secure Data Management in Decentralized Systems

    Secure Data Management in Decentralized Systems

    • 優惠價: 7199

    The field of database security has expanded greatly, due to the rapid development of the global inte... more

    Moving Target Defense II: Application of Game Theory and Adversarial Modeling

    Moving Target Defense II: Application of Game Theory and Adversarial Modeling

    • 優惠價: 6599

    Covers recent breakthroughs, accomplishments and future research in Moving Target Defense Presents a... more

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats

    • 優惠價: 5999

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of... more

    Security and Protection in Information Processing Systems: Ifip 18th World Computer Congress Tc11 19th International Information Security Conference 2

    Security and Protection in Information Processing Systems: Ifip 18th World Computer Congress Tc11 19th International Information Security Conference 2

    • 優惠價: 3299

    Security and Protection in Information Processing Systems Edited by Yves Deswarte, Frédéric Cuppens, Sushil Jajodia...... more

    Applications of Data Mining in Computer Security

    Applications of Data Mining in Computer Security

    • 優惠價: 6599

    Data mining is becoming a pervasive technology in activities as diverse as using historical data to ... more

    Advanced Transaction Models and Architectures

    Advanced Transaction Models and Architectures

    • 優惠價: 10199

    Motivation Modem enterprises rely on database management systems (DBMS) to collect, store and manage... more

    Multimedia Database Systems: Issues and Research Directions

    Multimedia Database Systems: Issues and Research Directions

    • 優惠價: 6599

    The information superhighway will bring vast amounts of information to everyone. Multimedia database... more

    Proceedings of the Ifip Tc 11 23rd International Information Security Conference: Ifip 20th World Computer Congress, Ifip Sec’’08, September 7-10, 2008

    Proceedings of the Ifip Tc 11 23rd International Information Security Conference: Ifip 20th World Computer Congress, Ifip Sec’’08, September 7-10, 2008

    • 優惠價: 10199
    Journal on Data Semantics II

    Journal on Data Semantics II

    • 優惠價: 3299
    Database Security XII: Status and Prospects

    Database Security XII: Status and Prospects

    • 優惠價: 10199
    Integrity and Internal Control in Information Systems: Ifip Tc11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Inf

    Integrity and Internal Control in Information Systems: Ifip Tc11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Inf

    • 優惠價: 13199
    Advances in Multimedia Information Systems: 4th International Workshop, Mis’’98, Istanbul, Turkey September 24-26, 1998, Proceedings

    Advances in Multimedia Information Systems: 4th International Workshop, Mis’’98, Istanbul, Turkey September 24-26, 1998, Proceedings

    • 優惠價: 3299
    Ict Systems Security and Privacy Protection: 29th Ifip Tc 11 International Conference, Sec 2014, Marrakech, Morocco, June 2-4, 2

    Ict Systems Security and Privacy Protection: 29th Ifip Tc 11 International Conference, Sec 2014, Marrakech, Morocco, June 2-4, 2

    • 優惠價: 6599

    This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Secu... more

    Encyclopedia of Cryptography and Security

    Encyclopedia of Cryptography and Security

    • 優惠價: 56999

    Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Securit... more

    Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008. Pr

    Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008. Pr

    • 優惠價: 4180

    These proceedings contain the papers selected for presentation at the 13th European Symposium on Res... more

    搜尋推薦

    您可能感興趣的活動

    • 博客來【每字美句】收藏、紀錄、分享你最愛的一句