Listing 1 - 3 of 3 |
Sort by
|
Choose an application
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.
Computer Science. --- Systems and Data Security. --- Economics/Management Science, general. --- Computer Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Computer Systems Organization and Communication Networks. --- Computer science. --- Computer network architectures. --- Data protection. --- Data structures (Computer science). --- Economics. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Structures de données (Informatique) --- Economie politique --- Architectures --- Computer networks --- Data encryption (Computer science) --- Electronic commerce --- Computers --- Security measures --- Economic aspects --- Access control --- Computer networks - Security measures - Economic aspects - Congresses --- Data encryption (Computer science) - Economic aspects - Congresses --- Electronic commerce - Security measures - Congresses --- Computers - Access control - Economic aspects - Congresses
Choose an application
This book contains the proceedings of the Second European Conference on Computer Network Defence that took place in December 2006 at the Faculty of Advanced Technology, University of Glamorgan, in the UK. The theme of the conference was the protection of computer networks, with contributions from both national and international participants reporting on research developments, as well as providing valuable insights in this area. The book also incorporates the proceedings of the First Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2006), held in conjunction with EC2ND 2006. Topics and issues discussed include: Computer Network Operations Computer Network Attack Network Application Security Network Forensics Web Security Vulnerability Management and Tracking Network Defence Wireless and Mobile Security Cryptography Network Discovery and Mapping Network Security Intrusion Detection Systems Incident Response and Management Computer Forensics Practice Malicious Software Analysis Network Architectures and Management Legal and Ethical Issues The papers presented include contributions from leading figures in the fields of network security and computer forensics, and are a valuable source of reference for both researchers and practitioners.
Computer Science. --- Management of Computing and Information Systems. --- Legal Aspects of Computing. --- Information Systems Applications (incl.Internet). --- Information Storage and Retrieval. --- Computer Communication Networks. --- Computer science. --- Information storage and retrieval systems. --- Information systems. --- Computers --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Systèmes d'information --- Ordinateurs --- Law and legislation. --- Droit --- Information storage and retrieval systems --- Computer networks -- Security measures -- Congresses. --- Computer Science -- Information technology. --- Computer security -- Congresses. --- Computer networks --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer Science --- Telecommunications --- Security measures --- Computer communication systems. --- Information storage and retrieval. --- Computers. --- Management information systems. --- Information Systems Applications (incl. Internet). --- Information storage and retrieva. --- Cyberspace --- Law and legislation --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Informatics --- Science --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing
Choose an application
To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. These various IDSs will flag alerts when suspicious events are observed. This book is an edited volume by world class leaders within computer network and information security presented in an easy-to-follow style. It introduces defense alert systems against computer and network attacks. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more.
Computer networks --- Réseaux d'ordinateurs --- Security measures. --- Sécurité --- Mesures --- Computer networks -- Security measures. --- Computer Science -- IT. --- Computer security. --- Intrusion detection systems (Computer security). --- Engineering & Applied Sciences --- Computer Science --- Electrical & Computer Engineering --- Telecommunications --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer organization. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer Systems Organization and Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Organization, Computer --- Informatics --- Science --- Distributed processing --- Computer network architectures. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Listing 1 - 3 of 3 |
Sort by
|