Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
            
  Top » Catalog » Books » Computer Science and Robotics » My Account  |  Cart Contents  |  Checkout   
Quick Find
  
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
The Copper Garden: New Zealand Novels
$195.00
Shopping Cart more
0 items
Information
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
Bestsellers
01.Robotics in Surgery: History, Current and Future Applications
02.From Problem Toward Solution: Wireless Sensor Networks Security
03.Introduction to Graph and Hypergraph Theory
04.Wiki Supporting Formal and Informal Learning
05.Intelligent Vehicle Systems: A 4D/RCS Approach
06.Artificial Intelligence in Energy and Renewable Energy Systems
07.Advances in Security Information Management: Perceptions and Outcomes
08.Computer Vision and Robotics
09.MOSFETs: Properties, Preparations and Performance
10.Expert Systems Research Trends
Notifications more
NotificationsNotify me of updates to Computer Security: Intrusion, Detection and Prevention
Tell A Friend
 
Tell someone you know about this product.
Computer Security: Intrusion, Detection and Prevention
Retail Price: $195.00
10% Online Discount
You Pay:

$175.50
Editors: Ronald D. Hopkins and Wesley P. Tokere
Book Description:
The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy. Computer security imposes requirements on computers that are different from most system requirements because they often take the form of constraints on what computers are not supposed to do. This makes computer security particularly challenging because it is hard enough just to make computer programs do everything they are designed to do correctly. Furthermore, negative requirements are deceptively complicated to satisfy and require exhaustive testing to verify, which is impractical for most computer programs. Computer security provides a technical strategy to convert negative requirements to positive enforceable rules. This new book presents the lastest research from around the globe in this ever-changing field.

Table of Contents:
Preface

Chapter 1. Self-Organizing Maps in Computer Security; pp. 1-30
(Jan Feyereisl and Uwe Aickelin, The University of Nottingham, Nottingham, UK)

Chapter 2. Network Management Focused on Client Computer; pp. 31-49
(Kazuya Odagiri, The University of Electro-Communications, and Naohiro Ishii, Aichi Institute of Technology)

Chapter 3. ^Trends, Problems and Misconceptions on Testing Network Intrusion Detection Systems Effectiveness; pp. 51-62
(Agustin Orfila, Juan M. E. Tapiador, and Arturo Ribagorda, Computer Science Department, Universidad Carlos III de Madrid, Leganes, Madrid, Spain)

Chapter 4. Reconfigurable Hardware in Modern Security Systems; pp. 63-90
(Issam Damaj, Dept. of Electrical and Computer Engineering, Dhofar University, Salalah, Oman, Youssef Iraqi, Dept. of Computer Science, Dhofar University, Salalah, Oman, and Safaa Kasbah, Foundation Program, Dhofar University, Salalah, Oman)

Chapter 5. *Performance for Cryptography: a hardware approach; pp. 91-106
(Athanasios P. Kakarountas, University of Central Greece, Greece, Haralambos Michail, Department of Electrical and Computer Eng.
University of Patras, Greece)

Chapter 6. *Fast Face Detector and Recognition for Biometrical Security System; pp. 107-123
(Jose M. Chaves-González, Miguel A. Vega-Rodríguez, Juan A. Gómez-Pulido and Juan M. Sánchez-Peréz)

Chapter 7. *Morpheus: A Word Oriented Stream Cipher; pp. 125-138
(Nikos Komninos, Algorithms and Security Group, Athens Information Technology, Greece)

Chapter 8. *Preserving Data Authenticity in Wireless Sensor Networks; pp. 139-158
(Zhen Jiang - Department of Computer Science, West Chester University, PA), and (Yi Pan - Department Computer Science, Georgia State University, Atlanta, GA)

Chapter 9. *Long-term Security for Signed Documents: Services,
Protocols, and Data Structures; pp. 159-173
(Thomas Kunz, Susanne Okunick, Ursula Viebeg (Fraunhofer Gesellschaft (FhG),Institute for Secure Information Technology (SIT), Darmstadt, Germany))

Short Communication

Access Control In Healthcare Information Systems - Context Aware Attribute Based Approach; pp. 175-191
(Snezana Sucurovic, Institute Mihailo Pupin, Belgrade, Serbia, and Dejan Simic, Faculty of Organisational Sciences, Belgrade, Serbia)

Index pp.193-202

   Binding: Hardcover
   Pub. Date: 2011 - 1st Quarter
   Pages: 202 pp.
   ISBN: 978-1-60692-781-6
   Status: AV
  
Status Code Description
AN Announcing
FM Formatting
PP Page Proofs
FP Final Production
EP Editorial Production
PR At Prepress
AP At Press
AV Available
  
Customers who bought this product also purchased
Globalization: Understanding, Management, and Effects
Globalization: Understanding, Management, and Effects
Democracy – A Destiny of Humankind? A Qualified, Contingent and Contextual Case for Democracy Promotion
Democracy – A Destiny of Humankind? A Qualified, Contingent and Contextual Case for Democracy Promotion
Eyes on You: Background and Issues Surrounding Surveillance from the Sky
Eyes on You: Background and Issues Surrounding Surveillance from the Sky
State Building and Democracy in Africa: A Comparative and Developmental Approach
State Building and Democracy in Africa: A Comparative and Developmental Approach
Language and Linguistics: Emerging Trends
Language and Linguistics: Emerging Trends
Military Advisors
Military Advisors
Special Focus Titles
01.Chaliapin and the Jews: The Question of Chaliapin's Purported Antisemitism
02.The Humanities: Past, Present and Future
03.The Poles: Myths and Reality
04.Child-Rearing: Practices, Attitudes and Cultural Differences
05."A Home Away from Home": A Community of International and South African University Students
06.Palliative Care: Oncology Experience from Hong Kong
07.The Enigma of Autism: Genius, Disorder or Just Different?
08.The Collector Mentality: Modernization of the Hunter-Gatherer
09.Face Processing: Systems, Disorders and Cultural Differences
10.Occurrences, Structure, Biosynthesis, and Health Benefits Based on Their Evidences of Medicinal Phytochemicals in Vegetables and Fruits. Volume 8
11.Crystal Growth: Concepts, Mechanisms and Applications
12.The Economic, Social and Political Impact of Mining on Akyem Abuakwa from the Pre-Colonial Era up to 1943

Nova Science Publishers
© Copyright 2004 - 2017

Computer Security: Intrusion, Detection and Prevention