menu
{ "item_title" : "Secure It Systems", "item_author" : [" Audun Jøsang", "Bengt Carlsson "], "item_description" : "Designed to Fail: A USB-Connected Reader for Online Banking.- Security Add-Ons for Mobile Platforms.- THAPS: Automated Vulnerability Scanning of PHP Applications.- Cyber security exercises and competitions as a platform for cyber security experiments.- The Development of Cyber Security Warning, Advice & Report Points.- Towards an Empirical Examination of IT Security Infrastructures in SME.- How to Select a Security Requirements Method? A comparative study with students and practitioners.- There is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication.- Coinductive Unwinding of Security-Relevant.- Retooling and Securing Systemic Debugging.- Cracking Associative Passwords.- A Hybrid Approach for Highly Available & Secure Storage of Pseudo-SSO Credentials.- Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links.- Everything but the Kitchen Sink: Determining the effect of multiple attacks on privacy preserving technology users.- Can We Identify Manipulative Behavior and the Corresponding Suspects on Review Websites using Supervised Learning?.- Privacy-Friendly Cloud Storage for the Data Track.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/3/64/234/209/3642342094_b.jpg", "price_data" : { "retail_price" : "72.00", "online_price" : "72.00", "our_price" : "72.00", "club_price" : "72.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Secure It Systems|Audun Jøsang

Secure It Systems : 17th Nordic Conference, Nordsec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Designed to Fail: A USB-Connected Reader for Online Banking.- Security Add-Ons for Mobile Platforms.- THAPS: Automated Vulnerability Scanning of PHP Applications.- Cyber security exercises and competitions as a platform for cyber security experiments.- The Development of Cyber Security Warning, Advice & Report Points.- Towards an Empirical Examination of IT Security Infrastructures in SME.- How to Select a Security Requirements Method? A comparative study with students and practitioners.- There is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication.- Coinductive Unwinding of Security-Relevant.- Retooling and Securing Systemic Debugging.- Cracking Associative Passwords.- A Hybrid Approach for Highly Available & Secure Storage of Pseudo-SSO Credentials.- Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links.- Everything but the Kitchen Sink: Determining the effect of multiple attacks on privacy preserving technology users.- Can We Identify Manipulative Behavior and the Corresponding Suspects on Review Websites using Supervised Learning?.- Privacy-Friendly Cloud Storage for the Data Track.

This item is Non-Returnable

Details

  • ISBN-13: 9783642342097
  • ISBN-10: 3642342094
  • Publisher: Springer
  • Publish Date: September 2012
  • Dimensions: 9 x 6 x 0.6 inches
  • Shipping Weight: 0.8 pounds
  • Page Count: 247

Related Categories

You May Also Like...

    1

BAM Customer Reviews