Buch, Englisch, Band 45, 241 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 388 g
5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009, Proceedings
Buch, Englisch, Band 45, 241 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 388 g
Reihe: Communications in Computer and Information Science
ISBN: 978-3-642-04061-0
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Mustererkennung, Biometrik
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
Weitere Infos & Material
Question: Where Would You Go to Escape Detection If You Wanted to Do Something Illegal on the Internet? Hint: Shush!.- A Security Audit Framework for Security Management in the Enterprise.- Watermarking Spatial Data in Geographic Information Systems.- Situation Awareness in Systems of Systems Ad-Hoc Environments.- The Georgia’s Cyberwar.- The UK Government’s Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabilities in the TETRA Architecture.- Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions.- Analyzing the Extent of Notice to Customer Attitude in the Organizational Structure of Vendors and Its Effect on e-Buyer’s Trust.- A Systems Framework for Sustainability.- Hybrid Genetic Algorithm for Travel Time Reliability of Optimal Path.- Geofencing in a Security Strategy Model.- Using Business Process Execution Language to Handle Evaluation Factors for Web Services Compositions.- The Significance of Security in Transmitting Clinical Data.- Security Concern over Earth Viewer Software Using Satellite Photo Service.- The People’s Republic of China – The Emerging Cyberpower.- Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation.- Neural Networks for Intrusion Detection Systems.- Exploitation of Secrets Injected in Java Midlets.- Biometrically Based Electronic Signatures for a Public Networked Environment.- Policy Translation and Reconciliation Techniques for the System-of-Systems Domain.- The Kido Botnet: Back to the Future.- Information Systems Security and Its Affiliation to Information Technology Risk Management.- A Sustainable Approach to Healing the World for Humanity and the Environment. An Evolving Idea.- Hey – Get Off My Cloud!.- Static and DynamicAnalysis for Web Security in Generic Format.