On specifying security policies for web documents with an XML-based language
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Security status display and browser interframe communication
Proceedings of the 2002 ACM symposium on Applied computing
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
A novel computer architecture to prevent destruction by viruses
Journal of Computer Science and Technology
Protection and administration of XML data sources
Data & Knowledge Engineering - Data and applications security
Securing XML Documents with Author-X
IEEE Internet Computing
Smart card embedded information systems: a methodology for privacy oriented architectural design
Data & Knowledge Engineering - DKE 40
A Secure Publishing Service for Digital Libraries of XML Documents
ISC '01 Proceedings of the 4th International Conference on Information Security
Managing e-business: security issues and solutions
Managing web usage in the workplace
Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
Bidirectional mobile code trust management using tamper resistant hardware
Mobile Networks and Applications - Security in mobile computing environments
Current security management & Ethical issues of information technology
Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
A Security Architecture for Mobility-Related Services
Wireless Personal Communications: An International Journal
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Building an information security education program
Proceedings of the 1st annual conference on Information security curriculum development
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
On performance analysis of challenge/response based authentication in wireless networks
Computer Networks and ISDN Systems
A novel secure wireless video surveillance system based on Intel IXP425 network processor
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
Verifiable digital object identity system
Proceedings of the ACM workshop on Digital rights management
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
Computer Networks: The International Journal of Computer and Telecommunications Networking
A platform independent approach for mobile agents to monitor network vulnerabilities
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
Distributed agent architecture for packet filtering & monitoring in networked computers
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
Optimizing security in e-commerce through implementation of hybrid tecnologies
CSECS'06 Proceedings of the 5th WSEAS International Conference on Circuits, Systems, Electronics, Control & Signal Processing
A pioneer compression technique for database
MATH'08 Proceedings of the American Conference on Applied Mathematics
Privacy-Aware Collaborative Access Control in Web-Based Social Networks
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
Expert Systems with Applications: An International Journal
On performance analysis of challenge/response based authentication in wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Access control for XML documents and data
Information Security Tech. Report
Improved client authentication using session authentication in the internet
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
A process-oriented model for authentication on the basis of a coloured Petri net
BPM'03 Proceedings of the 2003 international conference on Business process management
Fuzzy approach in biometric authentication by keystroke dynamics
FS'05 Proceedings of the 6th WSEAS international conference on Fuzzy systems
Visual programming of location-based services
HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
Security agent model using interactive authentication database
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Client authentication model using duplicated authentication server systems
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Web data protection: principles and research issues
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
SecWEM: a security solution for web based e-mail
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Hi-index | 0.00 |
From the Publisher:As we enter the age of universal electronic connectivity in which viruses, hackers, electronic eavesdropping, and electronic fraud can threaten the prosperity and productivity of corporations and individuals, security is increasingly important. Fortunately, the discipline of network security has matured, leading to the development of practical, available applications to enforce network security. This book provides an integrated, comprehensive, up-to-date coverage of internet-based security tools and applications vital to any treatment of data communications or networking. Best-selling author and four-time winner of the TEXTY Award for the best computer science and engineering text, William Stallings provides a practical survey of both the principles and practice of network security. Well organized to provide the optimal sequence for classroom instruction and self-study, this text includes these key features: Covers important network security tools and applications, including Kerberos, X.509v3, PGP, S/MIME, IP security, SSL/TLS, and SET Chapters on Web security and network management security (SNMPv3) Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems.