Computer Security in the 21st Century (eBook)

eBook Download: PDF
2005 | 2005
XII, 268 Seiten
Springer US (Verlag)
978-0-387-24006-0 (ISBN)

Lese- und Medienproben

Computer Security in the 21st Century -
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of :

- Fundamental new security

- Cryptographic protocols and design,

- A new way of measuring network vulnerability: attack surfaces,

- Network vulnerability and building impenetrable systems,

- Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.



Computer Security in the 21st Century

Edited by D.T. Lee, S.P. Shieh, and J.D. Tygar

 

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: secure security protocol design, secure peer-to-peer P2P and ad hoc networks Ad Hoc Networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of:

* Fundamental new security

* Cryptographic protocols and design,

* A new way of measuring network vulnerability: attack surfaces,

* Network vulnerability and building impenetrable systems,

* Multimedia content protection including a new standard for photographic images, JPEG2000.

 

Researchers and computer security developers will find in this volume book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

 

ABOUT THE AUTHORS

D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security.

 

S. P.hiuh-Pyng Shieh is a Professor in the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems.

 

J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley. He served as chair of the Defense Department's Study Group on Security with Privacy. He works in the areas of computer security, privacy, and electronic commerce. His current research includes strong privacy protections, security issues in sensor webs, and digital rights management.


Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.Highlights include presentations of :- Fundamental new security- Cryptographic protocols and design,- A new way of measuring network vulnerability: attack surfaces,- Network vulnerability and building impenetrable systems, - Multimedia content protection including a new standard for photographic images, JPEG2000. Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

Computer Security in the 21st Century Edited by D.T. Lee, S.P. Shieh, and J.D. Tygar   Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: secure security protocol design, secure peer-to-peer P2P and ad hoc networks Ad Hoc Networks, multimedia security, and intrusion detection, defense and measurement. Highlights include presentations of: * Fundamental new security * Cryptographic protocols and design, * A new way of measuring network vulnerability: attack surfaces, * Network vulnerability and building impenetrable systems, * Multimedia content protection including a new standard for photographic images, JPEG2000.   Researchers and computer security developers will find in this volume book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.   ABOUT THE AUTHORS D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security.   S. P.hiuh-Pyng Shieh is a Professor in the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems.   J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley. He served as chair of the Defense Department’s Study Group on Security with Privacy. He works in the areas of computer security, privacy, and electronic commerce. His current research includes strong privacy protections, security issues in sensor webs, and digital rights management.

Contents 5
List of Figures 9
INTRODUCTION 12
SECURITY PROTOCOL DESIGN 15
CHALLENGES IN PROTOCOL DESIGN AND ANALYSIS 16
AUTHENTICATION PROTOCOL ANALYSIS 60
SELF-CERTIFIED APPROACH FOR AUTHENTICATED AGREEMENT 70
ADAPTIVE RANDOM 97
DISTRIBUTION SCHEMES 97
FOR WIRELESS SENSOR NETWORKS 97
INTRUSION DETECTION, DEFENSE, MEASURE- MENT 112
MEASURING RELATIVE ATTACK SURFACES 113
A MODELING OF'INTRUSION DETECTION SYSTEMS WITH IDENTIFICATION CAPABILITY 142
A SOURCE-END DEFENSE SYSTEM AGAINST DDOS ATTACKS 149
BEAGLE: TRACKING SYSTEM FAILURES FOR REPRODUCING SECURITY FAULTS 171
WEB APPLICATION SECURITY-PAST, PRESENT, AND FUTURE 184
SECURING JPEG2000 CODE-STREAMS 229
A SECRET INFORMATION HIDING SCHEME BASED ON SWITCHING TREE CODING 254
Index 263

Erscheint lt. Verlag 5.12.2005
Zusatzinfo XII, 268 p. 77 illus.
Verlagsort New York
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
Technik Nachrichtentechnik
Schlagworte attack surfaces • Code • Coding • cryptographic protocols • cryptography • database matching • data structures • denial of service • Distributed denial of service • Information • jpeg2000 • Multimedia • multimedia security • privacy • sensor network • Viruses
ISBN-10 0-387-24006-3 / 0387240063
ISBN-13 978-0-387-24006-0 / 9780387240060
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 13,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99