LIBROS DEL AUTOR: sushil jajodia

17 resultados para LIBROS DEL AUTOR: sushil jajodia

  • Network Security Metrics
    Anoop Singhal / Lingyu Wang / Sushil Jajodia
    This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since 'you cannot improve what you cannot measure', a network security metric is essential to evaluating the ...
    Disponible

    121,94 €

  • Network Security Metrics
    Anoop Singhal / Lingyu Wang / Sushil Jajodia
    This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since 'you cannot improve what you cannot measure', a network security metric is essential to evaluating the ...
    Disponible

    169,77 €

  • Network Hardening
    Lingyu Wang / Massimiliano Albanese / Sushil Jajodia
    This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means of network defense than relying solely on the experience and skills of a human ana...
    Disponible

    66,58 €

  • Intrusion Detection in Distributed Systems
    Peng Ning / Sushil Jajodia / X. Sean Wang
    Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework ...
    Disponible

    66,91 €

  • Database Security XII
    Sushil Jajodia
    New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. Database Security Volume XII covers issues r...
    Disponible

    47,69 €

  • Database Security XII
    Sushil Jajodia
    New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. Database Security...
    Disponible

    207,54 €

  • Multilevel Secure Transaction Processing
    Binto George / Sushil Jajodia / Vijay Atluri
    Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive informatio...
    Disponible

    208,40 €

  • Information Hiding
    Neil Johnson / Sushil Jajodia / Zoran Duric
    Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganog...
    Disponible

    134,53 €

  • Trusted Recovery and Defensive Information Warfare
    Peng Liu / Sushil Jajodia
    Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system. Trusted Rec...
    Disponible

    134,57 €

  • Time Granularities in Databases, Data Mining, and Temporal Reasoning
    Claudio Bettini / Sean Wang / Sushil Jajodia
    Calendar and time units and specialized units, such as business days and academic years, play a major role in a wide range of information system applications. System support for reasoning about these units, called granularities, is important for the efficient design, use, and implementation of such applications. This book deals with several aspects of...
    Disponible

    66,52 €

  • Preserving Privacy in On-Line Analytical Processing (OLAP)
    Duminda Wijesekera / Lingyu Wang / Sushil Jajodia
    OLAP and Data Cubes.- Inference Control in Statistical Databases.- Inferences in Data Cubes.- Cardinality-based Inference Control.- Parity-based Inference Control for Range Queries.- Lattice-based Inference Control in Data Cubes.- Query-driven Inference Control in Data Cubes.- Conclusion and Future Direction. ...
    Disponible

    206,94 €

  • Preserving Privacy in On-Line Analytical Processing (OLAP)
    Duminda Wijesekera / Lingyu Wang / Sushil Jajodia
    This book addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive d...
    Disponible

    133,01 €

  • Trusted Recovery and Defensive Information Warfare
    Peng Liu / Sushil Jajodia
    Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system. Trusted Rec...
    Disponible

    133,21 €

  • Information Hiding
    Neil Johnson / Sushil Jajodia / Zoran Duric
    Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganog...
    Disponible

    133,17 €

  • Time Granularities in Databases, Data Mining, and Temporal Reasoning
    Claudio Bettini / Sean Wang / Sushil Jajodia
    Calendar and time units and specialized units, such as business days and academic years, play a major role in a wide range of information system applications. System support for reasoning about these units, called granularities, is important for the efficient design, use, and implementation of such applications. This book deals with several aspects of...
    Disponible

    65,15 €

  • Multilevel Secure Transaction Processing
    Binto George / Sushil Jajodia / Vijay Atluri
    Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive informatio...
    Disponible

    207,04 €

  • Database Security XII
    Sushil Jajodia
    New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. Database Security...
    Disponible

    206,19 €