000 04163nam a22003735i 4500
001 278923
003 MX-SnUAN
005 20160429153924.0
007 cr nn 008mamaa
008 150903s2005 xxu| o |||| 0|eng d
020 _a9780387240060
_9978-0-387-24006-0
024 7 _a10.1007/b104203
_2doi
035 _avtls000330005
039 9 _a201509031108
_bVLOAD
_c201405070454
_dVLOAD
_c201401311326
_dstaff
_c201401311150
_dstaff
_y201401291445
_zstaff
_wmsplit0.mrc
_x426
050 4 _aQA76.9.A25
100 1 _aLee, D. T.
_eeditor.
_9302894
245 1 0 _aComputer Security in the 21st Century /
_cedited by D. T. Lee, S. P. Shieh, J. D. Tygar.
264 1 _aBoston, MA :
_bSpringer US,
_c2005.
300 _aXII, 268 páginas,
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
500 _aSpringer eBooks
505 0 _aSecurity Protocol Design -- Challenges in Protocol Design and Analysis -- Private Matching -- Authentication Protocol Analysis -- Self-Certified Approach for Authenticated Key Agreement -- P2P and Ad Hoc Networks -- Experimenting with Admission Control in P2P Networks -- Adaptive Random Key Distribution Schemes for Wireless Sensor Networks -- Intrusion Detection, Defense, Measurement -- Measuring Relative Attack Surfaces -- A Modeling of Intrusion Detection Systems with Identification Capability -- A Source-End Defense System Against DDoS Attacks -- Beagle: Tracking System Failures for Reproducing Security Faults -- Multimedia Security -- Web Application Security—Past, Present, and Future -- Securing JPEG2000 Code-Streams -- A Secret Information Hiding Scheme Based on Switching Tree Coding.
520 _aComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement. Highlights include presentations of : * Fundamental new security * Cryptographic protocols and design, * A new way of measuring network vulnerability: attack surfaces, * Network vulnerability and building impenetrable systems, * Multimedia content protection including a new standard for photographic images, JPEG2000. Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns. ABOUT THE AUTHORS D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security. S. P. Shieh is a Professor and former Chair of the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems. J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley. He served as chair of the Defense Department’s Study Group on Security with Privacy. He works in the areas of computer security, privacy, and electronic commerce. His current research includes strong privacy protections, security issues in sensor webs, and digital rights management.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aShieh, S. P.
_eeditor.
_9302895
700 1 _aTygar, J. D.
_eeditor.
_9302896
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9780387240053
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/b104203
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c278923
_d278923