
En savoir plus sur le livre
The book covers a wide array of topics in security, addressing both theoretical and practical aspects. It begins with a keynote address on the security-usability chasm and delves into network security, exploring how real-world factors influence internet worm propagation and presenting an OS security protection model to counter network attacks. It also discusses a secure intra-domain routing protocol for wireless mesh networks. In the realm of cryptography, the text examines genetic algorithm-based steganography using wavelets, cryptanalysis of various protocols, and presents a near-optimal S-Box design. It introduces a software framework for autonomic security in pervasive environments and discusses distributed logical public-key hierarchies. Keynote talks focus on data privacy challenges and solutions, while protocols section presents secure chaotic synchronization and multi-authority proactive election schemes. Short papers investigate diverse topics, including detecting scanner-printer usage for fake documents, zero-knowledge password proofs for phishing attacks, and dynamic honeypot simulations to counter DDoS attacks. Additionally, the book emphasizes knowledge-based classification of abnormal BGP events and automated privilege separation, along with detection and recognition strategies, including constructing a common enumeration for cross-site scripting vulnerabilities and performance analysis of multi-sensor fing
Achat du livre
Information systems security, Patrick McDaniel
- Langue
- Année de publication
- 2007
- product-detail.submit-box.info.binding
- (souple)
Modes de paiement
Personne n'a encore évalué .