Coverart for item
The Resource Aspects of network and information security, edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian

Aspects of network and information security, edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian

Label
Aspects of network and information security
Title
Aspects of network and information security
Statement of responsibility
edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian
Creator
Contributor
Subject
Genre
Language
eng
Summary
Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network. Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorized data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques
Member of
Cataloging source
IOSPR
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
TK5105.59
LC item number
.A87 2008eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2005
http://bibfra.me/vocab/lite/meetingName
NATO Advanced Study Institute on Network Security and Intrusion Detection
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Kranakis, Evangelos
  • Haroutunian, Evgueni A
  • Shahbazian, E.
  • North Atlantic Treaty Organization
  • NATO Science for Peace and Security Programme
  • IOS Press
Series statement
NATO science for peace and security series. Sub-series D: Information and communication security,
Series volume
v. 17
http://library.link/vocab/subjectName
  • Computer networks
  • Information networks
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Computer networks
  • Information networks
Label
Aspects of network and information security, edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian
Instantiates
Publication
Note
  • "Proceedings of the NATO Advanced Study Institute on Network Security and Intrusion Detection, Yerevan, Armenia, 1-12 October 2005."
  • "Published in cooperation with NATO Public Diplomacy Division."
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • A.D. Keromytis
  • Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice"
  • I. Kotenko
  • Formal treatment of secure protocols: an introduction
  • D. Krizanc, J. Lipton
  • Behavioral and structural properties of malicious code
  • C. Kruegel
  • Security from the practitioner's point of view
  • M. Oit
  • Mobile and wireless communications security
  • Preface -- Section I: Network security:
  • B. Preneel
  • Humanitarian problems in information security
  • V. Tairyan [and others]
  • Multimedia security: open problems and solutions
  • S. Voloshynovskiy [and others]
  • A selective introduction to border gateway protocol (BGP) security issues
  • T. Wan, P.C. van Oorschot, E. Kranakis
  • Section II: Information security:
  • Steganography & steganalysis an overview of research & challenges
  • S.S. Agaian
  • Network security and survivability: using wireless overlay networks for critical infrastructure protection
  • Guessing and cryptography
  • E. Arikan
  • The exact approximate encryption of quantum information
  • J. Bouda
  • A new approach to stochastic quantum processes, their manipulation and control
  • A. Gevorkyan
  • Reliability approach in Wiretapper guessing theory
  • E.A. Haroutunian
  • E-capacity of information hiding systems
  • M.E. Haroutunian
  • M. Bermester
  • Quasicrystals in cryptography
  • J. Patera, M. Nesterenko
  • Asymptotic investigation of mutual information and capacity of certain communication channels
  • V. Prelov
  • Information theory of covert timing channels
  • A.B Wagner, V. Anantharam
  • Section III: Coding:
  • A survey of new results in coding with feedback and searching with lies
  • C. Deppe
  • Remarks on e-optimal rate function in DMS coding
  • Security when routers are taken over by the adversary
  • A. Harutyunyan
  • Reconstruction of data distorted by some errors
  • E. Konstantinova
  • On (w, r) cover-free codes
  • V. Lebedev
  • Switching methods for error-correcting codes
  • F. Solovéva
  • On reconstruction of functions on the hypercube
  • A. Vasiléva
  • Y. Desmedt
  • Security in quantum cryptography and quantum networks
  • J. Gruska
  • The case for self-healing software
Control code
491261484
Dimensions
unknown
Extent
1 online resource (ix, 355 pages)
Form of item
online
Isbn
9781607503262
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-1-58603-856-4
Specific material designation
remote
System control number
(OCoLC)491261484
Label
Aspects of network and information security, edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian
Publication
Note
  • "Proceedings of the NATO Advanced Study Institute on Network Security and Intrusion Detection, Yerevan, Armenia, 1-12 October 2005."
  • "Published in cooperation with NATO Public Diplomacy Division."
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • A.D. Keromytis
  • Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice"
  • I. Kotenko
  • Formal treatment of secure protocols: an introduction
  • D. Krizanc, J. Lipton
  • Behavioral and structural properties of malicious code
  • C. Kruegel
  • Security from the practitioner's point of view
  • M. Oit
  • Mobile and wireless communications security
  • Preface -- Section I: Network security:
  • B. Preneel
  • Humanitarian problems in information security
  • V. Tairyan [and others]
  • Multimedia security: open problems and solutions
  • S. Voloshynovskiy [and others]
  • A selective introduction to border gateway protocol (BGP) security issues
  • T. Wan, P.C. van Oorschot, E. Kranakis
  • Section II: Information security:
  • Steganography & steganalysis an overview of research & challenges
  • S.S. Agaian
  • Network security and survivability: using wireless overlay networks for critical infrastructure protection
  • Guessing and cryptography
  • E. Arikan
  • The exact approximate encryption of quantum information
  • J. Bouda
  • A new approach to stochastic quantum processes, their manipulation and control
  • A. Gevorkyan
  • Reliability approach in Wiretapper guessing theory
  • E.A. Haroutunian
  • E-capacity of information hiding systems
  • M.E. Haroutunian
  • M. Bermester
  • Quasicrystals in cryptography
  • J. Patera, M. Nesterenko
  • Asymptotic investigation of mutual information and capacity of certain communication channels
  • V. Prelov
  • Information theory of covert timing channels
  • A.B Wagner, V. Anantharam
  • Section III: Coding:
  • A survey of new results in coding with feedback and searching with lies
  • C. Deppe
  • Remarks on e-optimal rate function in DMS coding
  • Security when routers are taken over by the adversary
  • A. Harutyunyan
  • Reconstruction of data distorted by some errors
  • E. Konstantinova
  • On (w, r) cover-free codes
  • V. Lebedev
  • Switching methods for error-correcting codes
  • F. Solovéva
  • On reconstruction of functions on the hypercube
  • A. Vasiléva
  • Y. Desmedt
  • Security in quantum cryptography and quantum networks
  • J. Gruska
  • The case for self-healing software
Control code
491261484
Dimensions
unknown
Extent
1 online resource (ix, 355 pages)
Form of item
online
Isbn
9781607503262
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-1-58603-856-4
Specific material designation
remote
System control number
(OCoLC)491261484

Library Locations

    • Thomas Jefferson LibraryBorrow it
      1 University Blvd, St. Louis, MO, 63121, US
      38.710138 -90.311107
Processing Feedback ...