Dear readers, Although it is well-known that confidentiality, integrity and availability are high- level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security.
Changes in society resulting from the pervasiveness of information technology have produced positive and negative, intended and unintended consequences.
Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security.
Formal Methods for Open Object-Based Distributed Systems presents the leading edge in several related fields, specifically object-orientated programming, open distributed systems and formal methods for object-oriented systems.
Database Semantics: Semantic Issues in Multimedia Systems reflects the state of the art of emerging research on the meaning of multimedia information, as presented during IFIP's Eighth Data Semantics Working Conference (DS-8), organized by its Working Group 2.
There are numerous factors contributing to the dynamic growth of wireless communication systems we've been observing in the past 10 years, the most important being the increasing network user mobility and the technological advances in high-speed data transmission over radio channels.
Telecommunication Network Intelligence is a state-of-the-art book that deals with issues related to the development, distribution, and management of intelligent capabilities and services in telecommunication networks.
Formal Methods for Open Object-Based Distributed Systems IV presents the leading edge in the fields of object-oriented programming, open distributed systems, and formal methods for object-oriented systems.
Environmental Informatics (or Enviromatics) is a maturing subject with interdisciplinary roots in computer science, environmental planning, ecology, economics and other related areas.
Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future.
High Performance Networking is a state-of-the-art book that deals with issues relating to the fast-paced evolution of public, corporate and residential networks.
The primary aim for this book is to gather and collate articles which represent the best and latest thinking in the domain of technology transfer, from research, academia and practice around the world.
Intelligent Information Processing presents new research with special emphasis on knowledge-based system architecture and intelligent information management.
Usability has become increasingly important as an essential part of the design and development of software and systems for all sectors of society, business, industry, government and education, as well as a topic of research.
Advanced Communications and Multimedia Security presents a state-of-the-art review of current perspectives as well as the latest developments in the area of communications and multimedia security.
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society.
Semantic Issues in e-Commerce Systems comprises the proceedings of the Ninth Working Conference on Database Semantics, which was sponsored by the International Federation for Information Processing (IFIP) and held in Hong Kong in April 2001.
Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace.
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005).
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany.
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it.
Artificial Intelligence is one of the oldest and most exciting subfields of computing, covnering such areas as intelligent robotics, intelligent planning and scheduling, model-based reasoning, fault diagnosis, natural language processing, maching translation, knowledge representation and reasoning, knowledge-based systems, knowledge engineering, intelligent agents, machine learning, neural nets, genetic algorithms and knowledge management.
Evolutionary Computation for Optimization and Modeling is an introduction to evolutionary computation, a field which includes genetic algorithms, evolutionary programming, evolution strategies, and genetic programming.
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats.
Most books about global optimization describe the theory of the algorithms, whereas a given implementation's quality never depends exclusively on the theoretical soundness of the algorithms that are implemented.
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.