logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Ict Systems Security and Privacy Protection: 31st Ifip Tc 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings

Ict Systems Security and Privacy Protection: 31st Ifip Tc 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings (Hardcover, 2016)

Stefan Katzenbeisser, Jaap-henk Hoepman (엮은이)
Springer
110,990원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
91,010원 -18% 0원
4,560원
86,450원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Ict Systems Security and Privacy Protection: 31st Ifip Tc 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings
eBook 미리보기

책 정보

· 제목 : Ict Systems Security and Privacy Protection: 31st Ifip Tc 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings (Hardcover, 2016) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9783319336299
· 쪽수 : 414쪽
· 출판일 : 2016-05-11

목차

Coercion-Resistant Proxy Voting.- A Posteriori Openable Public Key Encryption.-Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid.- Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research.- Evaluating CVSS Base Score Using Vulnerability Rewards Programs.- Defining Objectives For Preventing Cyberstalking.- Using Process Invariants to Detect Cyber Attacks on a Water Treatment System.- Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud.- Software Defined Networking Reactive Stateful Firewall.- Teaching Phishing-Security: Which Way is Best?.- On Gender Specific Perception of Data Sharing in Japan.- TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.- SybilRadar: A Graph-Structure Based Framework for Sybil Detection in Online Social Networks.- Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence.- Automated Source Code Instrumentation for Verifying Potential Vulnerabilities.- An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities.- Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Scanners.- A Utility-Based Reputation Model for the Internet of Things.- Advanced Remote Firmware Upgrades Using TPM 2.0.- RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks.- Uncertain? No, it's Very Certain! Recovering the Key from Guessing Entropy Enhanced CPA.- Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware.- NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries.- A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor.- Deducing User Presence from Inter-Message Intervals in Home Automation Systems.- Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies.- A Trustless Privacy-Preserving Reputation System.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책