Information Security and Digital Forensics [recurso electrónico] : First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers / edited by Dasun Weerasinghe.
Tipo de material: TextoSeries Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 41Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Descripción: VIII, 185 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642115301Tema(s): Computer science | Computer Communication Networks | Data protection | Data structures (Computer science) | Data encryption (Computer science) | Biometrics | Computer Science | Systems and Data Security | Computer Communication Networks | Biometrics | Data Encryption | Data Structures, Cryptology and Information Theory | Data StructuresFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.8 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónicoTipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | QA76.9 .A25 (Browse shelf(Abre debajo)) | 1 | No para préstamo | 374038-2001 |
Navegando Biblioteca Electrónica Estantes, Código de colección: Colección de Libros Electrónicos Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
QA76.9 .A25 Privacy and Anonymity in Information Management Systems | QA76.9 .A25 Security for Web Services and Service-Oriented Architectures | QA76.9 .A25 Data Privacy Management and Autonomous Spontaneous Security | QA76.9 .A25 Information Security and Digital Forensics | QA76.9 .A25 Theory of Cryptography | QA76.9 .A25 Topics in Cryptology - CT-RSA 2010 | QA76.9 .A25 Progress in Cryptology – AFRICACRYPT 2010 |
Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks -- A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation -- On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise -- Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment -- Face Recognition Using Balanced Pairwise Classifier Training -- Forensic Investigation of the Soft-Modded PlayStation Portable (PSP) -- Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems -- Parameter Based Access Control Model for Mobile Handsets -- Ethical Dilemmas in Teaching Computer and Internet Security -- Overview of SIP Attacks and Countermeasures -- Security Challenges in Multihop Wireless Mesh Networks–A Survey -- A Security Architecture to Protect Against Data Loss -- A Simple Method for Improving Intrusion Detections in Corporate Networks -- Detecting Sybils in Peer-to-Peer File Replication Systems -- Adaptive Clustering Method for Reclassifying Network Intrusions -- Technology Perspective: Is Green IT a Threat to IT Security? -- An Adaptive Fusion Framework for Fault-Tolerant Multibiometrics -- Cross-Enterprise Policy Model for e-Business Web Services Security -- Challenges of Identity Management – A Context in Rural India.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Information Security and Digital Forensics, ISDF 2009, which was held in September 2009 in London, United Kingdom. The 19 papers present several security, identity and forensics challenges across the globe to address better the gap in the digital economy market and thus to develop further an appriate security and identity framework and solutions to protect the next generation of IT applications.
19