Get Free Shipping on orders over $79
Information Systems Security : 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings - Venkat Venkatakrishnan

Information Systems Security

8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings

By: Venkat Venkatakrishnan (Editor), Diganta Goswami (Editor)

Paperback | 25 October 2012

At a Glance

Paperback


$84.99

or 4 interest-free payments of $21.25 with

 or 

Ships in 5 to 7 business days

Fighting Malicious Software.- VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security.- Security Assessment of Node.js Platform.- Foundations of Dynamic Access Control.- Risk-Aware RBAC Sessions.- A Cognitive Trust Model for Access Control Framework i MANET.- Trust-OrBAC: A Trust Access Control Model in Multi-Organization Environments.- On Policies and Intents.- ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel.- Keyless Steganography in Spatial Domain Using Energetic Pixels.- Fuzzy Inference Rule Based Reversible Watermarking for Digital Images.- Secure Trust Metadata Management for Mobile Ad-Hoc Networks.- Defence against Wormhole Attacks in Wireless Mesh Networks.- A Novel Key Update Protocol in Mobile Sensor Networks.- Autonomous Certification with List-Based Revocation for Secure V2V Communication.- Mitigating Insider Threat on Database Integrity.- Coercion Resistant MIX for Electronic Auction.- Verification of Money Atomicity in Digital Cash Based Payment System.- Cryptographic Analysis of a Type of Sequence Generators.- Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs.- Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks.- Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF.- Attacking Image Based CAPTCHAs Using Image Recognition Techniques.- Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.

More in Network Hardware

Practical Monitoring : Effective Strategies for the Real World - Mike Julian
Bluetooth LE Audio : Fundamental to Recent Advances - Himanshu Bhalla
Designing Embedded Hardware 2e : O'Reilly Ser. - John Catsoulis

RRP $95.00

$43.75

54%
OFF
Cisco IOS in a Nutshell : In a Nutshell - James Boney

RRP $75.99

$30.00

61%
OFF
UNIX in a Nutshell : In a Nutshell - Arnold Robbins

RRP $85.75

$43.75

49%
OFF
Computer Viruses and Malware : Advances In Information Security - John Aycock
JUNOS Cookbook : Cookbooks (O'Reilly) - Aviva Garrett

RRP $104.75

$41.00

61%
OFF
JUNOS Enterprise Switching : OREILLY - Harry Reynolds

RRP $133.00

$53.00

60%
OFF
Getting Started with Netduino : OREILLY - Chris Walker

RRP $38.00

$15.00

61%
OFF
Getting Started with Bluetooth Low Energy - Carles Cufi Akiba

RRP $85.75

$34.00

60%
OFF
Juniper QFX5100 Series - Douglas Richard, Jr. Hanks

RRP $114.00

$45.00

61%
OFF
Applied Embedded Electronics : Design Essentials for Robust Systems - Jerry Twomey
Cryptocurrency Mining For Dummies : 2nd Edition - Peter Kent

RRP $49.95

$42.75

14%
OFF