As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...
Lire la suiteConstitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...
Lire la suiteFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
Lire la suiteINTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...
Lire la suiteProvides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s ...
Lire la suiteDescribes how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with ...
Lire la suite