did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781606927816

Computer Security : Intrusion, Detection and Prevention

by ;
  • ISBN13:

    9781606927816

  • ISBN10:

    1606927817

  • Format: Hardcover
  • Copyright: 2009-07-29
  • Publisher: Nova Science Pub Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $155.00

Summary

The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy. Computer security imposes requirements on computers that are different from most system requirements because they often take the form of constraints on what computers are not supposed to do. This makes computer security particularly challenging because it is hard enough just to make computer programs do everything they are designed to do correctly. Furthermore, negative requirements are deceptively complicated to satisfy and require exhaustive testing to verify, which is impractical for most computer programs. Computer security provides a technical strategy to convert negative requirements to positive enforceable rules. This book presents the latest research from around the globe in this ever-changing field.

Table of Contents

Preface
Self-Organizing Maps in Computer Security
Network Management Focused on Client Computer
Trends, Problems and Misconceptions on Testing Network Intrusion Detection Systems Effectiveness
Reconfigurable Hardware in Modern Security Systems
Performance for Cryptography: a hardware approach
Fast Face Detector and Recognition for Biometrical Security System
Morpheus: A Word Oriented Stream Cipher
From Problem to Solution: Wireless Sensor Networks Security
Long-term Security for Signed Documents: Services, Protocols, and Data Structures
Access Control in Healthcare Information Systems - Context Aware Attribute Based Approach
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program