IMIST


Affiner votre recherche

Votre recherche a retourné 333 résultats.

Applied cryptography : protocols, algorithms, and source code in C / par Schneier,, Bruce, Publication : New York : Wiley, 1996 . xxiii, 758 p. : 24 cm. Date : 1996 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Computer security Art and science par Bishop, Matt Publication : Boston Addison-Wesley 2003 . xli, 1084 pages 24 cm. Date : 2003 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Cryptography and network security par Stallings, William. Publication : [S.l.] Stallings William 2011 . 743 p. , Cryptography and Network Security. 24 cm. Date : 2011 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Decrypted secrets : methods and maxims of cryptology / par Bauer, Friedrich Ludwig, Publication : Berlin ; | New York : Springer, . xii, 524 pages, [16] pages of plates: Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Electronic postage systems : technology, security, economics / par Bleumer, Gerrit. Publication : [New York ] : Springer, 2007 . xxiii, 248 p. : , Includes index. 23 cm. Date : 2007 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Juridiques, Economiques et de Gestion (1),

Hop integrity in the Internet / par Huang,, Chin-Tser, Publication : New York : Springer, 2006 . x, 112 p. : 25 cm. Date : 2006 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Introduction to computer security par Bishop, Matt. Publication : [S.l.] Addison-Wesley Professional 2005 . 747 p. , In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company. Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest. 24 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Multimedia encryption and watermarking / par Furht,, Borivoje. Publication : New York : Springer, 2005 . xvii, 327 p. : 24 cm.w Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Network security policies and procedures / par Frye, Douglas W. Publication : New York : Springer, 2007 . 240 p. : 25 cm. Date : 2007 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Preserving privacy in On-Line Analytical Processing (OLAP) / par Wang, Lingyu. Publication : New York : Springer, 2007 . xi, 180 p. : 25 cm. Date : 2007 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Security and game theory algorithms, deployed systems, lessons learned par Tambe, Milind Publication : Cambridge | New York Cambridge University Press 2012 . xiv, 319 pages , "Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"-- 24 cm. Date : 2012 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Security engineering a guide to building dependable distributed systems par Anderson, Ross, Publication : Indianapolis, IN Wiley Pub., 2008 . xl, 1040 pages 25 cm. Date : 2008 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Security in computing par Pfleeger,, Charles P., Publication : Upper Saddle River, NJ Prentice Hall, 2007 . xxix, 845 pages 25 cm. Date : 2007 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Vous ne trouvez pas ce que vous cherchez ?
© Tous droits résérvés IMIST/CNRST
Angle Av. Allal Al Fassi et Av. des FAR, Hay Ryad, BP 8027, 10102 Rabat, Maroc
Tél:(+212) 05 37.56.98.00
CNRST / IMIST

Propulsé par Koha