HOME > 상세정보

상세정보

Computer security in the 21st century

Computer security in the 21st century (2회 대출)

자료유형
단행본
개인저자
Lee, D. T. Shieh, S. P 1960- Tygar, J. D.
서명 / 저자사항
Computer security in the 21st century / edited by D.T. Lee, S.P. Shieh, J.D. Tygar.
발행사항
New York :   Springer ,   c2005.  
형태사항
xi, 268 p. : ill. ; 24 cm.
ISBN
0387240055 0387240063 (e-ISBN)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security.
000 00946camuu22003014a 4500
001 000045216554
005 20060113161035
008 050202s2005 nyua b 001 0 eng
010 ▼a 2005042554
020 ▼a 0387240055
020 ▼a 0387240063 (e-ISBN)
035 ▼a (KERIS)REF000010946328
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b C648 2005
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b C7382
245 0 0 ▼a Computer security in the 21st century / ▼c edited by D.T. Lee, S.P. Shieh, J.D. Tygar.
246 3 ▼a Computer security in the twenty-first century
260 ▼a New York : ▼b Springer , ▼c c2005.
300 ▼a xi, 268 p. : ▼b ill. ; ▼c 24 cm.
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security.
700 1 ▼a Lee, D. T.
700 1 ▼a Shieh, S. P ▼d 1960-
700 1 ▼a Tygar, J. D.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 C7382 등록번호 121118554 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of :

- Fundamental new security

- Cryptographic protocols and design,

- A new way of measuring network vulnerability: attack surfaces,

- Network vulnerability and building impenetrable systems,

- Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.



Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of :

- Fundamental new security

- Cryptographic protocols and design,

- A new way of measuring network vulnerability: attack surfaces,

- Network vulnerability and building impenetrable systems,

- Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.



New feature

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of :

* Fundamental new security

* Cryptographic protocols and design,

* A new way of measuring network vulnerability: attack surfaces,

* Network vulnerability and building impenetrable systems,

* Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

ABOUT THE AUTHORS

D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security.

 

S. P. Shieh is a Professor and former Chair of the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems.

 

J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley.  He served as chair of the Defense Department’s Study Group on Security with Privacy. He works in the areas of computer security, privacy, and electronic commerce.  His current research includes strong privacy protections, security issues in sensor webs, and digital rights management. 




정보제공 : Aladin

목차

INTRODUCTION, D. T. Lee, S. P. Shieh, J. D. Tygar. -PART I: SECURITY PROTOCOL DESIGN. -Challenges in Protocol Design and Analysis, Dieter Gollmann. --Private Matching,Yaping Li, J. D. Tygar, Joseph M. Hellerstein. -Authentication Protocol Analysis, Jonathan Millen. -Self-certified Approach for Authenticated Key Agreement, Tzong-Chen Wu, Yen-Ching Lin. -PART II P2P AND AD HOC NETWORKS. -Experimenting with Admission Control in P2P Networks, Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi -Adaptive Random Key Distribution Schemes for Wireless Sensor Networks, Shih-I Huang, Shiuhpyng Shieh, S.Y. Wu. -PART III INTRUSION DETECTION, DEFENSE, MEASUREMENT. -Measuring Relative Attack Surfaces, Michael Howard, Jon Pincus, Jeannette M. Wing. -A Modeling of Intrusion Detection Systems with Identification Capability, Pei-Te Chen, Benjamin Tseng, Chi-Sung Laih. -A Source-End Defense System against DDoS Attacks, Fu-Yuan Lee, Shiuhpyng Shieh, JuiTing Shieh, Sheng-Hsuan Wang. -BEAGLE: Tracking System Failures for Reproducing Security Faults, Chang-Hsien Tsai, Shih-Hung Liu, Shuen-Wen Huang, Shih-Kun Huang, Deron Liang. -Part IV MULTIMEDIA SECURITY. -Web Application Security-Past, Present, and Future, Yao-Wen Huang, D. T. Lee. -Securing JPEG2000 CodeStreams, Robert H. Deng, Yongdong Wu, Di Ma. -A Secret Information Hiding Scheme Based on Switching Tree Coding, Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu .


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)