Analysis Techniques for Information Security - Datta, Anupam
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre46,67 €
Produit Neuf
Ou 11,67 € /mois
- Livraison à 0,01 €
- Livré entre le 11 et le 18 mai
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9783031012068_dbm
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Analysis Techniques For Information Security de Datta, Anupam Format Broché - Livre Informatique
0 avis sur Analysis Techniques For Information Security de Datta, Anupam Format Broché - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Vertigo Of Color
Neuf dès 60,00 €
-
Le Mans
Neuf dès 69,82 €
Occasion dès 129,99 €
-
Louise Bourgeois & Pablo Picasso - Anatomies Of Desire - Hauser & Wirth, 2019
Occasion dès 48,90 €
-
Functions Of One Complex Variable I
Neuf dès 65,69 €
-
Don't Have Feelings, Don't Make A Scene
Neuf dès 53,90 €
-
Sports Illustrated Swimsuit Portfolio: Paradise Found
Occasion dès 67,60 €
-
Bojack Horseman
Occasion dès 40,58 €
-
Nuova Grammatica Pratica Della Lingua Itiliana
Occasion dès 59,90 €
-
Bmw R850, 1100 & 1150 4-Valve Twins (93 - 06) Haynes Repair Manual
Neuf dès 44,38 €
-
Ripailles
1 avis
Occasion dès 59,00 €
-
English Grammar And Composition: Complete Course Grade 12
Occasion dès 32,99 €
-
The Cambridge Companion To The Problem Of Evil
Neuf dès 44,93 €
-
Nuovo Espresso 3 B1 - Libro Dello Studente E Esercizi
8 avis
Neuf dès 49,17 €
Occasion dès 48,81 €
-
L'anglais B2 - Pack Usb, Avec 1 Clé Usb
3 avis
Occasion dès 39,00 €
-
Chord Melody Method For Accordion
Neuf dès 43,99 €
-
The Queer Cinema Of Derek Jarman
Neuf dès 41,77 €
Occasion dès 24,91 €
-
Lost Decade: Story Of The "Pogues"
Occasion dès 30,00 €
-
Moonwalk
2 avis
Neuf dès 29,14 €
Occasion dès 72,99 €
-
Les Epistres Des Dames De Grèce - Une Version Médiévale En Prose Française Des Héroïdes D'ovide
Neuf dès 24,00 €
-
The Challenger Sale
Occasion dès 41,99 €
Produits similaires
Présentation Analysis Techniques For Information Security de Datta, Anupam Format Broché
- Livre Informatique
Résumé :
Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols
Biographie:
Anupam Datta is on the research faculty at Carnegie Mellon University. Dr. Datta's research interests are in trustworthy systems, privacy, and analysis of cryptographic protocols. He has served as General Chair of the 2008 IEEE Computer Security Foundations Symposium, Program Co-chair of the 2008 Formal and Computational Cryptography Workshop, and on the program committees of many computer security conferences including ACM CCS, IEEE S&P, and IEEE CSF. Dr. Datta has a PhD in Computer Science from Stanford University and a BTech from IIT Kharagpur. Somesh Jha received his B.Tech from Indian Institute of Technology, New Delhi in Electrical Engineering. He received his Ph.D. in Computer Science from Carnegie Mellon University in 1996. Currently, Somesh Jha is a Professor in the Computer Sciences Department at the University of Wisconsin (Madison), which he joined in 2000. His work focuses on analysis of security protocols, survivability analysis, intrusion detection, formal methods for security, and analyzing malicious code. Recently he has also worked on privacy-preserving protocols. Somesh Jha has published over 100 articles in highly-refereed conferences and prominent journals. He has won numerous best-paper awards. Somesh also received the NSF career award in 2005. Ninghui Li is an Associate Professor of Computer Science at Purdue University. He received a Bachelor's degree from the University of Science and Technology of China in 1993 and a Ph.D. in Computer Science from New York University in 2000. Before joining the faculty of Purdue in 2003, he was a Research Associate at Stanford University Computer Science Department for 3 years. Prof. Li's research interests are in computer and information security and privacy, with focuses on access control and data privacy. He has published over 90 referred papers, and has served on the Program Committees of more than 50 international conferences and workshops, including serving as the Program Chair of the 2008 ACM Symposium on Access Control Models and Technologies and the 2009 IFIP WG 11.11 International Conference on Trust Management (IFIPTM). He is on the editorial board of the VLDB Journal. His research is funded by the National Science Foundation, the Air Force Office of Scientific Research (AFOSR), the Office of Naval Research (ONR), and by IBM and Google. In 2005, he was awarded an NSF CAREER award. David Melski has been the head of the research division of GrammaTech, Inc. since 2002. Under Melski's leadership, GrammaTech Research focuses on automatic analysis and transformation of software for the purposes of reverse engineering, protection of critical IP, assurance, and producibility. GrammaTech Research employs static analysis, dynamic analysis, and combinations of static and dynamic techniques. GrammaTech Research is a leader in the development of analysis techniques both for source code and machine code. Melski received his Ph.D. in Computer Sciences from the University of Wisconsin, wherehis research interests included static analysis, profiling, and profile-directed optimization. Melski's Ph.D. thesis presented a framework for developing interprocedural path profiling techniques, and examined the use of path profiles for automatic program optimization. Thomas Reps is Professor of Computer Science in the Computer Sciences Department of the University of Wisconsin, which he joined in 1985. Reps is the author or co-author of four books and more than one hundred fifty papers describing his research. His research has concerned program development environments, software engineering tools, incremental graph algorithms, programanalysis algorithms, and computer security. Reps received his Ph.D. in Computer Science from Cornell University in 1982, and his Ph.D. dissertation won the...
Détails de conformité du produit
Personne responsable dans l'UE