Computer Security in the 21st Century

Author:   D.T. Lee ,  S. P. Shieh ,  J. Doug Tygar
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2005
ISBN:  

9781441936790


Pages:   268
Publication Date:   29 October 2010
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $393.36 Quantity:  
Add to Cart

Share |

Computer Security in the 21st Century


Add your own review!

Overview

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement. Highlights include presentations of : - Fundamental new security - Cryptographic protocols and design, - A new way of measuring network vulnerability: attack surfaces, - Network vulnerability and building impenetrable systems, - Multimedia content protection including a new standard for photographic images, JPEG2000. Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

Full Product Details

Author:   D.T. Lee ,  S. P. Shieh ,  J. Doug Tygar
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2005
Dimensions:   Width: 15.50cm , Height: 1.50cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9781441936790


ISBN 10:   1441936793
Pages:   268
Publication Date:   29 October 2010
Audience:   Professional and scholarly ,  Professional and scholarly ,  Professional & Vocational ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Security Protocol Design.- Challenges in Protocol Design and Analysis.- Private Matching.- Authentication Protocol Analysis.- Self-Certified Approach for Authenticated Key Agreement.- P2P and Ad Hoc Networks.- Experimenting with Admission Control in P2P Networks.- Adaptive Random Key Distribution Schemes for Wireless Sensor Networks.- Intrusion Detection, Defense, Measurement.- Measuring Relative Attack Surfaces.- A Modeling of Intrusion Detection Systems with Identification Capability.- A Source-End Defense System Against DDoS Attacks.- Beagle: Tracking System Failures for Reproducing Security Faults.- Multimedia Security.- Web Application Security—Past, Present, and Future.- Securing JPEG2000 Code-Streams.- A Secret Information Hiding Scheme Based on Switching Tree Coding.

Reviews

Author Information

Computer Security in the 21st Century Edited by D.T. Lee, S.P. Shieh, and J.D. Tygar Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: secure security protocol design, secure peer-to-peer P2P and ad hoc networks Ad Hoc Networks, multimedia security, and intrusion detection, defense and measurement. Highlights include presentations of: * Fundamental new security * Cryptographic protocols and design, * A new way of measuring network vulnerability: attack surfaces, * Network vulnerability and building impenetrable systems, * Multimedia content protection including a new standard for photographic images, JPEG2000. Researchers and computer security developers will find in this volume book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns. ABOUT THE AUTHORS D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security. S. P.hiuh-Pyng Shieh is a Professor in the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems. J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley. He served as chair of the Defense Department's Study Group on Security with Privacy. He works in the areas of computer security, privacy, and electronic commerce. His current research includes strong privacy protections, security issues in sensor webs, and digital rights management.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List