Articles liés à Security in Computing Systems: Challenges, Approaches...

Security in Computing Systems: Challenges, Approaches and Solutions - Couverture souple

 
9783642097195: Security in Computing Systems: Challenges, Approaches and Solutions

Synopsis

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ‘‘information society’’, we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ‘‘global information infrastructure’’ on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

À propos de l?auteur

Joachim Biskup has been Professor of Computer Science since 1981 at the University of Dortmund, University of Hildesheim and University of Dortmund again. He has done research in recursion and complexity theory, information systems with an emphasis on database schema design, query optimization and mediation, and various aspects of security. He served on the program committees of many international conferences, including ICDT, FoIKS, ESORICS and IFIP WG 11.3 Conference on Database and Applications Security.

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

Acheter neuf

Afficher cet article
EUR 160,49

Autre devise

EUR 23 expédition depuis Allemagne vers Etats-Unis

Destinations, frais et délais

Autres éditions populaires du même titre

9783540784418: Security in Computing Systems: Challenges, Approaches, and Solutions

Edition présentée

ISBN 10 :  3540784411 ISBN 13 :  9783540784418
Editeur : Springer-Verlag Berlin and Heide..., 2008
Couverture rigide

Résultats de recherche pour Security in Computing Systems: Challenges, Approaches...

Image fournie par le vendeur

Joachim Biskup
ISBN 10 : 3642097197 ISBN 13 : 9783642097195
Neuf Taschenbuch
impression à la demande

Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, 'computing' refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ''information society'', we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ''global information infrastructure'' on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously. 724 pp. Englisch. N° de réf. du vendeur 9783642097195

Contacter le vendeur

Acheter neuf

EUR 160,49
Autre devise
Frais de port : EUR 23
De Allemagne vers Etats-Unis
Destinations, frais et délais

Quantité disponible : 2 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Joachim Biskup
Edité par Springer Berlin Heidelberg, 2010
ISBN 10 : 3642097197 ISBN 13 : 9783642097195
Neuf Couverture souple
impression à la demande

Vendeur : moluna, Greven, Allemagne

Évaluation du vendeur 4 sur 5 étoiles Evaluation 4 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Broad and comprehensive coverage of all issues related to computer securityPresents both informal surveys as well as rigorous formalizations when necessaryIncludes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP. N° de réf. du vendeur 5048716

Contacter le vendeur

Acheter neuf

EUR 136,16
Autre devise
Frais de port : EUR 48,99
De Allemagne vers Etats-Unis
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image d'archives

Biskup, Joachim
Edité par Springer, 2010
ISBN 10 : 3642097197 ISBN 13 : 9783642097195
Neuf Couverture souple

Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. In. N° de réf. du vendeur ria9783642097195_new

Contacter le vendeur

Acheter neuf

EUR 181,72
Autre devise
Frais de port : EUR 13,71
De Royaume-Uni vers Etats-Unis
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Joachim Biskup
ISBN 10 : 3642097197 ISBN 13 : 9783642097195
Neuf Taschenbuch

Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. Neuware -This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, ¿computing¿ refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ¿¿information society¿¿, we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ¿¿global information infrastructure¿¿ on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 724 pp. Englisch. N° de réf. du vendeur 9783642097195

Contacter le vendeur

Acheter neuf

EUR 160,49
Autre devise
Frais de port : EUR 60
De Allemagne vers Etats-Unis
Destinations, frais et délais

Quantité disponible : 2 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Joachim Biskup
Edité par Springer Berlin Heidelberg, 2010
ISBN 10 : 3642097197 ISBN 13 : 9783642097195
Neuf Taschenbuch

Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, 'computing' refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ''information society'', we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ''global information infrastructure'' on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously. N° de réf. du vendeur 9783642097195

Contacter le vendeur

Acheter neuf

EUR 160,49
Autre devise
Frais de port : EUR 65,39
De Allemagne vers Etats-Unis
Destinations, frais et délais

Quantité disponible : 1 disponible(s)

Ajouter au panier