Wonder Club world wonders pyramid logo
×

Computer Security in the 21st Century Book

Computer Security in the 21st Century
Be the First to Review this Item at Wonderclub
X
Computer Security in the 21st Century, Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security prool design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion de, Computer Security in the 21st Century
out of 5 stars based on 0 reviews
5
0 %
4
0 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $147.50
Original Magazine
Physical Format

Sold Out

  • Computer Security in the 21st Century
  • Written by author Lee, D. T., Shieh, S. P., Tygar, J. Doug
  • Published by Springer-Verlag New York, LLC, 10/29/2010
  • Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security prool design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion de
Buy Digital  USD$147.50

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

INTRODUCTION, D. T. Lee, S. P. Shieh, J. D. Tygar. -PART I: SECURITY PROTOCOL DESIGN. -Challenges in Prool Design and Analysis, Dieter Gollmann. —Private Matching,Yaping Li, J. D. Tygar, Joseph M. Hellerstein. -Authentication Prool Analysis, Jonathan Millen. -Self-certified Approach for Authenticated Key Agreement, Tzong-Chen Wu, Yen-Ching Lin. -PART II P2P AND AD HOC NETWORKS. -Experimenting with Admission Control in P2P Networks, Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi -Adaptive Random Key Distribution Schemes for Wireless Sensor Networks, Shih-I Huang, Shiuhpyng Shieh, S.Y. Wu. -PART III INTRUSION DETECTION, DEFENSE, MEASUREMENT. -Measuring Relative Attack Surfaces, Michael Howard, Jon Pincus, Jeannette M. Wing. -A Modeling of Intrusion Detection Systems with Identification Capability, Pei-Te Chen, Benjamin Tseng, Chi-Sung Laih. -A Source-End Defense System against DDoS Attacks, Fu-Yuan Lee, Shiuhpyng Shieh, JuiTing Shieh, Sheng-Hsuan Wang. -BEAGLE: Tracking System Failures for Reproducing Security Faults, Chang-Hsien Tsai, Shih-Hung Liu, Shuen-Wen Huang, Shih-Kun Huang, Deron Liang. -Part IV MULTIMEDIA SECURITY. -Web Application Security-Past, Present, and Future, Yao-Wen Huang, D. T. Lee. -Securing JPEG2000 CodeStreams, Robert H. Deng, Yongdong Wu, Di Ma. -A Secret Information Hiding Scheme Based on Switching Tree Coding, Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu .


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Computer Security in the 21st Century, Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security prool design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion de, Computer Security in the 21st Century

X
WonderClub Home

This item is in your Collection

Computer Security in the 21st Century, Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security prool design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion de, Computer Security in the 21st Century

Computer Security in the 21st Century

X
WonderClub Home

This Item is in Your Inventory

Computer Security in the 21st Century, Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security prool design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion de, Computer Security in the 21st Century

Computer Security in the 21st Century

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: