免费下载书籍地址:PDF下载地址
精美图片

Computer Network Security计算机网络安全/会议录书籍详细信息
- ISBN:9783540291138
- 作者:暂无作者
- 出版社:暂无出版社
- 出版时间:2003-09
- 页数:477
- 价格:596.60
- 纸张:胶版纸
- 装帧:平装
- 开本:暂无开本
- 语言:未知
- 丛书:暂无丛书
- TAG:暂无
- 豆瓣评分:暂无豆瓣评分
内容简介:
The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form.Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science research forum available.
The scope of LNCS,including its subseries LNAI,spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields.The type of material published traditionally includes.
—proceedings (published in time for the respective conference)
—post-proceedings (consisting of thoroughly revised final full papers)
—research monographs(which may be based on outstanding PhD work,research projects,technical reports,etc.).
书籍目录:
Invited Papers
Self-managed Cells for Ubiquitous Systems
Critical Information Assurance Challenges for Modern Large-Scale
Infrastructures
Rule-Based Topological Vulnerability Analysis
Models and Analysis of Active Worm Defense
Prevention of Information Attacks by Run-Time Detection of
Self-replication in Computer Codes
Mathematical Models, Architectures and Protocols
for Computer Network Security
Calibrating Entropy Functions Applied to Computer Networks
A Passive External Web Surveillance Technique for Private Networks
A Secure Way to Combine IPsec, NAT & DHCP
A Generic Model for Analyzing Security Protocols
Networks, Markov Lie Monoids, and Generalized Entropy
Trust by Workflow in Autonomic Communication
An Ontology-Based Approach to Information Systems Security Management
Authentication, Authorization and Access Control
Safety Problems in Access Control with Temporal Constraints
A ModM Logic for Role-Based Access Control
Unique User-Generated Digital Pseudonyms
Information Flow Analysis, Covert Channels and
Trust Management
A Probabilistic Property-Specific Approach to Information Flow
Generalized Abstract Non-interference: Abstract Secure
Information-Flow Analysis for Automata
Detection of Illegal Information Flow
Towards More Controllable and Practical Delegation
Security Policy and Operating System Security
Policy-Driven Routing Management Using CIM
Secure Hybrid Operating System "Linux over Fenix"
……
Threat Modeling,Vulnerability Assessment and Network Forensics
Intrusion Detection
Xhort Paters
Author Index
作者介绍:
暂无相关内容,正在全力查找中
出版社信息:
暂无出版社相关信息,正在全力查找中!
书籍摘录:
暂无相关书籍摘录,正在全力查找中!
在线阅读/听书/购买/PDF下载地址:
在线阅读地址:Computer Network Security计算机网络安全/会议录在线阅读
在线听书地址:Computer Network Security计算机网络安全/会议录在线收听
在线购买地址:Computer Network Security计算机网络安全/会议录在线购买
原文赏析:
暂无原文赏析,正在全力查找中!
其它内容:
暂无其它内容!
书籍真实打分
故事情节:7分
人物塑造:9分
主题深度:9分
文字风格:3分
语言运用:4分
文笔流畅:8分
思想传递:9分
知识深度:5分
知识广度:5分
实用性:7分
章节划分:5分
结构布局:7分
新颖与独特:7分
情感共鸣:9分
引人入胜:5分
现实相关:4分
沉浸感:7分
事实准确性:4分
文化贡献:7分
网站评分
书籍多样性:8分
书籍信息完全性:4分
网站更新速度:5分
使用便利性:4分
书籍清晰度:8分
书籍格式兼容性:5分
是否包含广告:6分
加载速度:7分
安全性:8分
稳定性:6分
搜索功能:3分
下载便捷性:8分
下载点评
- 排版满分(613+)
- 书籍多(519+)
- 简单(410+)
- 可以购买(126+)
- 三星好评(422+)
- 无水印(645+)
- pdf(119+)
- 值得下载(294+)
下载评价
网友 仰***兰:喜欢!很棒!!超级推荐!
网友 濮***彤:好棒啊!图书很全
网友 曾***文:五星好评哦
网友 谭***然:如果不要钱就好了
网友 冉***兮:如果满分一百分,我愿意给你99分,剩下一分怕你骄傲
网友 孙***美:加油!支持一下!不错,好用。大家可以去试一下哦
网友 潘***丽:这里能在线转化,直接选择一款就可以了,用他这个转很方便的
网友 常***翠:哈哈哈哈哈哈
网友 孙***夏:中评,比上不足比下有余
网友 龚***湄:差评,居然要收费!!!
网友 温***欣:可以可以可以
网友 孔***旋:很好。顶一个希望越来越好,一直支持。