1 / 228
文档名称:

insider-attack-and-cyber-security-beyond-the-hacker-advances-in-information-security.9780387773216.34065.pdf

格式:pdf   页数:228
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

insider-attack-and-cyber-security-beyond-the-hacker-advances-in-information-security.9780387773216.34065.pdf

上传人:kuo08091 2014/9/19 文件大小:0 KB

下载得到文件列表

insider-attack-and-cyber-security-beyond-the-hacker-advances-in-information-security.9780387773216.34065.pdf

文档介绍

文档介绍:Insider Attack and Cyber Security Beyond the Hacker Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems e Mason University Fairfax, VA 22030-4444 email: ******@ goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects puter work security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be modated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant prehensive textbook treatment. Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with ideas for books under this series. Additional titles in the series: INTRUSION DETECTION SYSTEMS edited by Robert Di Pietro and Luigi V. Mancini; ISBN: 978-0-387-77265-3 VULNERABILITY ANALYSIS AND DEFENSE FOR THE edited by Abhishek Singh; ISBN: 978-0-387-74389-9 DETECTION: Countering the Largest Security Threat edited by Wenke Lee, Cliff Wang and David Dagon; ISBN: 978-0-387-68766-7 PRIVACY-RESPECTING INTRUSION DETECTION by Ulrich Flegel; ISBN: 978-0-387-68254-9 SYNCHRONIZING PROTOCOL SECURITY (SIPSec) by Charles A. Shoniregun; ISBN: 978-0-387-32724-2 SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS edited by Ting Yu and Sushil Jajodia; ISBN: 978-0-387-27694-WORK SECURITY POLICIES AND PROCEDURES by Douglas W. Frye; ISBN: 0-387-30937-3 DATA WAREHOUSING AND DATA MINING TECHNIQUES FOR CYBER SECURITYby Anoop Sing