pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS
IFIP 18TH WORLD COMPUTER CONGRESS TC11 19TH INTERNATIONAL INFORMATION SECURITY CONFERENCE 22-27 AUGUST 2004 TOULOUSE, FRANCE
By: Yves Deswarte (Editor), Frederic Cuppens (Editor), Sushil Jajodia (Editor)
Format: Hardback

List price: £72.00


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 1402081421
ISBN 13: 9781402081422
Publisher: SPRINGER-VERLAG NEW YORK INC.
Pub. date: 1 July, 2004
Edition: 18th 2004 ed.
Series: IFIP Advances in Information and Communication Technology 147
Pages: 548
Description: Security is probably the most critical factor for the development of the Information Society. E-government, e-commerce, e-healthcare and other e-activities present challenging security requirements, except maybe if the citizens accept to waive their privacy. This book looks at the progress in security and privacy-preserving technologies.
Synopsis: Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful.Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.
Illustrations: XIV, 548 p. 39 illus.
Publication: US
Imprint: Springer-Verlag New York Inc.
Returns: Returnable
Some other items by this author:
ADVANCED TRANSACTION MODELS AND ARCHITECTURES (HB)
ADVANCED TRANSACTION MODELS AND ARCHITECTURES (PB)
ADVANCES IN MULTIMEDIA INFORMATION SYSTEMS (PB)
APPLICATIONS OF DATA MINING IN COMPUTER SECURITY (HB)
APPLICATIONS OF DATA MINING IN COMPUTER SECURITY (PB)
COMPUTER SECURITY - ESORICS 2008 (PB)
COMPUTER SECURITY - ESORICS 92 (PB)
COMPUTER SECURITY - ESORICS 98 (PB)
COMPUTER SECURITY -- ESORICS 2013 (PB)
COMPUTER SECURITY-ESORICS 2000 (PB)
CONCEPTUAL MODELING (PB)
CYBER DECEPTION (HB)
CYBER DECEPTION : BUILDING THE SCIENTIFI (PB)
CYBER SITUATIONAL AWARENESS (HB)
CYBER SITUATIONAL AWARENESS (PB)
CYBER WARFARE (HB)
CYBER WARFARE (PB)
DATA AND APPLICATIONS SECURITY AND PRIVACY (PB)
DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI (PB)
DATA AND APPLICATIONS SECURITY XIX (PB)
DATABASE SECURITY XII (HB)
DATABASE SECURITY XII (PB)
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY (HB)
FOUNDATIONS AND PRACTICE OF SECURITY (PB)
FOUNDATIONS AND PRACTICE OF SECURITY (PB)
FOUNDATIONS AND PRACTICE OF SECURITY (PB)
GRAPHICAL MODELS FOR SECURITY (PB)
HANDBOOK OF DATABASE SECURITY (HB)
HANDBOOK OF DATABASE SECURITY (PB)
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (HB)
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (PB)
INFORMATION HIDING (HB)
INFORMATION HIDING (PB)
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY (HB)
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY (PB)
INFORMATION SECURITY THEORY AND PRACTICE (PB)
INFORMATION SYSTEMS SECURITY (PB)
INFORMATION SYSTEMS SECURITY (PB)
INFORMATION SYSTEMS SECURITY (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS VI (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS VI (PB)
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS (HB)
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS (PB)
JOURNAL ON DATA SEMANTICS II (PB)
MOVING TARGET DEFENSE (HB)
MOVING TARGET DEFENSE (PB)
MOVING TARGET DEFENSE II (HB)
MOVING TARGET DEFENSE II (PB)
MULTILEVEL SECURE TRANSACTION PROCESSING (HB)
MULTILEVEL SECURE TRANSACTION PROCESSING (PB)
MULTIMEDIA DATABASE SYSTEMS (HB)
MULTIMEDIA DATABASE SYSTEMS (PB)
NETWORK HARDENING (PB)
NETWORK SECURITY METRICS
NETWORK SECURITY METRICS (HB)
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP) (HB)
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP) (PB)
PRIVACY IN LOCATION-BASED APPLICATIONS (PB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (HB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (PB)
RISKS AND SECURITY OF INTERNET AND SYSTEMS (PB)
SECURE CLOUD COMPUTING (HB)
SECURE CLOUD COMPUTING (PB)
SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS (HB)
SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS (PB)
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (PB)
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS (PB)
SECURITY OF INDUSTRIAL CONTROL SYSTEMS AND CYBER PHYSICAL SYSTEMS (PB)
SECURITY OF INDUSTRIAL CONTROL SYSTEMS AND CYBER-PHYSICAL SYSTEMS (PB)
SMART CARD RESEARCH AND ADVANCED APPLICATIONS VI (HB)
SMART CARD RESEARCH AND ADVANCED APPLICATIONS VI (PB)
TEMPORAL DATABASES (PB)
THEORY AND MODELS FOR CYBER SITUATION AWARENESS (PB)
TIME GRANULARITIES IN DATABASES, DATA MINING, AND TEMPORAL REASONING (HB)
TIME GRANULARITIES IN DATABASES, DATA MINING, AND TEMPORAL REASONING (PB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (HB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (PB)



Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
Ramadan and Eid al-Fitr A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
add to basket

Learning
That''s My Story!: Drama for Confidence, Communication and C... The ability to communicate is an essential life skill for all children, underpinning their confidence, personal and social wellbeing, and sense of self.
add to basket