Computer Network Security計算機(jī)網(wǎng)絡(luò)安全/會議錄

出版時間:2003-9  出版社:1 (2005年10月19日)  作者:Vladimir Gorodetsky  頁數(shù):477  

內(nèi)容概要

The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form.Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science research forum available.    The scope of LNCS,including its subseries LNAI,spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields.The type of material published traditionally includes.    —proceedings (published in time for the respective conference)    —post-proceedings (consisting of thoroughly revised final full papers)    —research monographs(which may be based on outstanding PhD work,research projects,technical reports,etc.).

書籍目錄

Invited Papers Self-managed Cells for Ubiquitous Systems Critical Information Assurance Challenges for Modern Large-Scale Infrastructures Rule-Based Topological Vulnerability Analysis Models and Analysis of Active Worm Defense Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer CodesMathematical Models, Architectures and Protocolsfor Computer Network Security Calibrating Entropy Functions Applied to Computer Networks A Passive External Web Surveillance Technique for Private Networks A Secure Way to Combine IPsec, NAT & DHCP A Generic Model for Analyzing Security Protocols Networks, Markov Lie Monoids, and Generalized Entropy Trust by Workflow in Autonomic Communication An Ontology-Based Approach to Information Systems Security ManagementAuthentication, Authorization and Access Control Safety Problems in Access Control with Temporal Constraints A ModM Logic for Role-Based Access Control Unique User-Generated Digital Pseudonyms Information Flow Analysis, Covert Channels and Trust Management A Probabilistic Property-Specific Approach to Information Flow Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata Detection of Illegal Information Flow Towards More Controllable and Practical DelegationSecurity Policy and Operating System Security Policy-Driven Routing Management Using CIM Secure Hybrid Operating System "Linux over Fenix" ……Threat Modeling,Vulnerability Assessment and Network ForensicsIntrusion DetectionXhort PatersAuthor Index

圖書封面

評論、評分、閱讀與下載


    Computer Network Security計算機(jī)網(wǎng)絡(luò)安全/會議錄 PDF格式下載


用戶評論 (總計0條)

 
 

推薦圖書


相關(guān)圖書

 

250萬本中文圖書簡介、評論、評分,PDF格式免費(fèi)下載。 第一圖書網(wǎng) 手機(jī)版

京ICP備13047387號-7