Aspects of network and information security:
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
IOS Press
c2008
|
Schriftenreihe: | NATO science for peace and security series
v. 17 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Proceedings of the NATO Advanced Study Institute on Network Security and Intrusion Detection, Yerevan, Armenia, 1-12 October 2005.". - "Published in cooperation with NATO Public Diplomacy Division." Includes bibliographical references and index Preface -- Section I: Network security - Network security and survivability: using wireless overlay networks for critical infrastructure protection - M. Bermester -- - Security when routers are taken over by the adversary - Y. Desmedt -- - Security in quantum cryptography and quantum networks - J. Gruska -- - The case for self-healing software - A.D. Keromytis -- - Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" - I. Kotenko -- - Formal treatment of secure protocols: an introduction - D. Krizanc, J. Lipton -- - Behavioral and structural properties of malicious code - C. Kruegel -- - Security from the practitioner's point of view - M. Oit -- - Mobile and wireless communications security - B. Preneel -- - Humanitarian problems in information security - V. Tairyan ... [et al.] -- - Multimedia security: open problems and solutions - S. Voloshynovskiy ... [et al.] -- - A selective introduction to border gateway protocol (BGP) security issues - T. Wan, P.C. van Oorschot, E. Kranakis -- - Section II: Information security - Steganography & steganalysis an overview of research & challenges - S.S. Agaian -- - Guessing and cryptography - E. Arikan -- - The exact approximate encryption of quantum information - J. Bouda -- - A new approach to stochastic quantum processes, their manipulation and control - A. Gevorkyan -- - Reliability approach in Wiretapper guessing theory - E.A. Haroutunian -- - E-capacity of information hiding systems - M.E. Haroutunian -- - Quasicrystals in cryptography - J. Patera, M. Nesterenko -- - Asymptotic investigation of mutual information and capacity of certain communication channels - V. Prelov -- - Information theory of covert timing channels - A.B Wagner, V. Anantharam -- - Section III: Coding - A survey of new results in coding with feedback and searching with lies - C. Deppe -- - Remarks on e-optimal rate function in DMS coding - A. Harutyunyan -- - Reconstruction of data distorted by some errors - E. Konstantinova -- - On (w, r) cover-free codes - V. Lebedev -- - Switching methods for error-correcting codes - F. Solovéva -- - On reconstruction of functions on the hypercube - A. Vasiléva Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network.Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorized data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques |
Beschreibung: | 1 Online-Ressource (ix, 355 p.) |
ISBN: | 1435677994 1586038567 1607503263 6000006357 9781435677999 9781586038564 9781607503262 9786000006358 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043169459 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2008 |||| o||u| ||||||eng d | ||
020 | |a 1435677994 |c electronic bk. |9 1-4356-7799-4 | ||
020 | |a 1586038567 |9 1-58603-856-7 | ||
020 | |a 1607503263 |9 1-60750-326-3 | ||
020 | |a 6000006357 |c ebook |9 600-00-0635-7 | ||
020 | |a 9781435677999 |c electronic bk. |9 978-1-4356-7799-9 | ||
020 | |a 9781586038564 |9 978-1-58603-856-4 | ||
020 | |a 9781607503262 |9 978-1-60750-326-2 | ||
020 | |a 9786000006358 |c ebook |9 978-600-00-0635-8 | ||
035 | |a (OCoLC)491261484 | ||
035 | |a (DE-599)BVBBV043169459 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
110 | 2 | |a NATO Advanced Study Institute on Network Security and Intrusion Detection <2005, Yerevan, Armenia> |e Verfasser |4 aut | |
245 | 1 | 0 | |a Aspects of network and information security |c edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian |
264 | 1 | |a Amsterdam |b IOS Press |c c2008 | |
300 | |a 1 Online-Ressource (ix, 355 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a NATO science for peace and security series |v v. 17 | |
500 | |a "Proceedings of the NATO Advanced Study Institute on Network Security and Intrusion Detection, Yerevan, Armenia, 1-12 October 2005.". - "Published in cooperation with NATO Public Diplomacy Division." | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Preface -- Section I: Network security - Network security and survivability: using wireless overlay networks for critical infrastructure protection - M. Bermester -- - Security when routers are taken over by the adversary - Y. Desmedt -- - Security in quantum cryptography and quantum networks - J. Gruska -- - The case for self-healing software - A.D. Keromytis -- - Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" - I. Kotenko -- - Formal treatment of secure protocols: an introduction - D. Krizanc, J. Lipton -- - Behavioral and structural properties of malicious code - C. Kruegel -- - Security from the practitioner's point of view - M. Oit -- - Mobile and wireless communications security - B. Preneel -- - Humanitarian problems in information security - V. Tairyan ... [et al.] -- - Multimedia security: open problems and solutions - S. Voloshynovskiy ... [et al.] -- | ||
500 | |a - A selective introduction to border gateway protocol (BGP) security issues - T. Wan, P.C. van Oorschot, E. Kranakis -- - Section II: Information security - Steganography & steganalysis an overview of research & challenges - S.S. Agaian -- - Guessing and cryptography - E. Arikan -- - The exact approximate encryption of quantum information - J. Bouda -- - A new approach to stochastic quantum processes, their manipulation and control - A. Gevorkyan -- - Reliability approach in Wiretapper guessing theory - E.A. Haroutunian -- - E-capacity of information hiding systems - M.E. Haroutunian -- - Quasicrystals in cryptography - J. Patera, M. Nesterenko -- - Asymptotic investigation of mutual information and capacity of certain communication channels - V. Prelov -- - Information theory of covert timing channels - A.B Wagner, V. Anantharam -- - Section III: Coding - A survey of new results in coding with feedback and searching with lies - C. Deppe -- | ||
500 | |a - Remarks on e-optimal rate function in DMS coding - A. Harutyunyan -- - Reconstruction of data distorted by some errors - E. Konstantinova -- - On (w, r) cover-free codes - V. Lebedev -- - Switching methods for error-correcting codes - F. Solovéva -- - On reconstruction of functions on the hypercube - A. Vasiléva | ||
500 | |a Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network.Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorized data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Information networks / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures |v Congresses | |
650 | 4 | |a Information networks |x Security measures |v Congresses | |
650 | 4 | |a Electronic books | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Kranakis, Evangelos |e Sonstige |4 oth | |
700 | 1 | |a Haroutunian, Evgueni A. |e Sonstige |4 oth | |
700 | 1 | |a Shahbazian, E. |e Sonstige |4 oth | |
710 | 2 | |a North Atlantic Treaty Organization |b Public Diplomacy Division |e Sonstige |4 oth | |
710 | 2 | |a NATO Science for Peace and Security Programme |e Sonstige |4 oth | |
710 | 2 | |a IOS Press |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244467 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028593650 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244467 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244467 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175648165462016 |
---|---|
any_adam_object | |
author_corporate | NATO Advanced Study Institute on Network Security and Intrusion Detection <2005, Yerevan, Armenia> |
author_corporate_role | aut |
author_facet | NATO Advanced Study Institute on Network Security and Intrusion Detection <2005, Yerevan, Armenia> |
author_sort | NATO Advanced Study Institute on Network Security and Intrusion Detection <2005, Yerevan, Armenia> |
building | Verbundindex |
bvnumber | BV043169459 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)491261484 (DE-599)BVBBV043169459 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06497nmm a2200661zcb4500</leader><controlfield tag="001">BV043169459</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1435677994</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4356-7799-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1586038567</subfield><subfield code="9">1-58603-856-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607503263</subfield><subfield code="9">1-60750-326-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6000006357</subfield><subfield code="c">ebook</subfield><subfield code="9">600-00-0635-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781435677999</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4356-7799-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781586038564</subfield><subfield code="9">978-1-58603-856-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607503262</subfield><subfield code="9">978-1-60750-326-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786000006358</subfield><subfield code="c">ebook</subfield><subfield code="9">978-600-00-0635-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)491261484</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043169459</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">NATO Advanced Study Institute on Network Security and Intrusion Detection <2005, Yerevan, Armenia></subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Aspects of network and information security</subfield><subfield code="c">edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">IOS Press</subfield><subfield code="c">c2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (ix, 355 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">NATO science for peace and security series</subfield><subfield code="v">v. 17</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Study Institute on Network Security and Intrusion Detection, Yerevan, Armenia, 1-12 October 2005.". - "Published in cooperation with NATO Public Diplomacy Division."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Preface -- Section I: Network security - Network security and survivability: using wireless overlay networks for critical infrastructure protection - M. Bermester -- - Security when routers are taken over by the adversary - Y. Desmedt -- - Security in quantum cryptography and quantum networks - J. Gruska -- - The case for self-healing software - A.D. Keromytis -- - Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" - I. Kotenko -- - Formal treatment of secure protocols: an introduction - D. Krizanc, J. Lipton -- - Behavioral and structural properties of malicious code - C. Kruegel -- - Security from the practitioner's point of view - M. Oit -- - Mobile and wireless communications security - B. Preneel -- - Humanitarian problems in information security - V. Tairyan ... [et al.] -- - Multimedia security: open problems and solutions - S. Voloshynovskiy ... [et al.] --</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - A selective introduction to border gateway protocol (BGP) security issues - T. Wan, P.C. van Oorschot, E. Kranakis -- - Section II: Information security - Steganography & steganalysis an overview of research & challenges - S.S. Agaian -- - Guessing and cryptography - E. Arikan -- - The exact approximate encryption of quantum information - J. Bouda -- - A new approach to stochastic quantum processes, their manipulation and control - A. Gevorkyan -- - Reliability approach in Wiretapper guessing theory - E.A. Haroutunian -- - E-capacity of information hiding systems - M.E. Haroutunian -- - Quasicrystals in cryptography - J. Patera, M. Nesterenko -- - Asymptotic investigation of mutual information and capacity of certain communication channels - V. Prelov -- - Information theory of covert timing channels - A.B Wagner, V. Anantharam -- - Section III: Coding - A survey of new results in coding with feedback and searching with lies - C. Deppe --</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - Remarks on e-optimal rate function in DMS coding - A. Harutyunyan -- - Reconstruction of data distorted by some errors - E. Konstantinova -- - On (w, r) cover-free codes - V. Lebedev -- - Switching methods for error-correcting codes - F. Solovéva -- - On reconstruction of functions on the hypercube - A. Vasiléva</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network.Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorized data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic books</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kranakis, Evangelos</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Haroutunian, Evgueni A.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shahbazian, E.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">North Atlantic Treaty Organization</subfield><subfield code="b">Public Diplomacy Division</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">NATO Science for Peace and Security Programme</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244467</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028593650</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244467</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244467</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043169459 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:37Z |
institution | BVB |
isbn | 1435677994 1586038567 1607503263 6000006357 9781435677999 9781586038564 9781607503262 9786000006358 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028593650 |
oclc_num | 491261484 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (ix, 355 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | IOS Press |
record_format | marc |
series2 | NATO science for peace and security series |
spelling | NATO Advanced Study Institute on Network Security and Intrusion Detection <2005, Yerevan, Armenia> Verfasser aut Aspects of network and information security edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian Amsterdam IOS Press c2008 1 Online-Ressource (ix, 355 p.) txt rdacontent c rdamedia cr rdacarrier NATO science for peace and security series v. 17 "Proceedings of the NATO Advanced Study Institute on Network Security and Intrusion Detection, Yerevan, Armenia, 1-12 October 2005.". - "Published in cooperation with NATO Public Diplomacy Division." Includes bibliographical references and index Preface -- Section I: Network security - Network security and survivability: using wireless overlay networks for critical infrastructure protection - M. Bermester -- - Security when routers are taken over by the adversary - Y. Desmedt -- - Security in quantum cryptography and quantum networks - J. Gruska -- - The case for self-healing software - A.D. Keromytis -- - Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" - I. Kotenko -- - Formal treatment of secure protocols: an introduction - D. Krizanc, J. Lipton -- - Behavioral and structural properties of malicious code - C. Kruegel -- - Security from the practitioner's point of view - M. Oit -- - Mobile and wireless communications security - B. Preneel -- - Humanitarian problems in information security - V. Tairyan ... [et al.] -- - Multimedia security: open problems and solutions - S. Voloshynovskiy ... [et al.] -- - A selective introduction to border gateway protocol (BGP) security issues - T. Wan, P.C. van Oorschot, E. Kranakis -- - Section II: Information security - Steganography & steganalysis an overview of research & challenges - S.S. Agaian -- - Guessing and cryptography - E. Arikan -- - The exact approximate encryption of quantum information - J. Bouda -- - A new approach to stochastic quantum processes, their manipulation and control - A. Gevorkyan -- - Reliability approach in Wiretapper guessing theory - E.A. Haroutunian -- - E-capacity of information hiding systems - M.E. Haroutunian -- - Quasicrystals in cryptography - J. Patera, M. Nesterenko -- - Asymptotic investigation of mutual information and capacity of certain communication channels - V. Prelov -- - Information theory of covert timing channels - A.B Wagner, V. Anantharam -- - Section III: Coding - A survey of new results in coding with feedback and searching with lies - C. Deppe -- - Remarks on e-optimal rate function in DMS coding - A. Harutyunyan -- - Reconstruction of data distorted by some errors - E. Konstantinova -- - On (w, r) cover-free codes - V. Lebedev -- - Switching methods for error-correcting codes - F. Solovéva -- - On reconstruction of functions on the hypercube - A. Vasiléva Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users cannot perform actions that they are not allowed to perform, but on the other hand, can perform the actions that they are allowed to. Network security not only involves specifying and implementing a security policy that describes access control, but also implementing an Intrusion Detection System as a tool for detecting attempted attacks or intrusions by crackers or automated attack tools and identifying security breaches such as incoming shellcode, viruses, worms, malware and trojan horses transmitted via a computer system or network.Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorized data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Information networks / Security measures fast Computer networks Security measures Congresses Information networks Security measures Congresses Electronic books (DE-588)1071861417 Konferenzschrift gnd-content Kranakis, Evangelos Sonstige oth Haroutunian, Evgueni A. Sonstige oth Shahbazian, E. Sonstige oth North Atlantic Treaty Organization Public Diplomacy Division Sonstige oth NATO Science for Peace and Security Programme Sonstige oth IOS Press Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244467 Aggregator Volltext |
spellingShingle | Aspects of network and information security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Information networks / Security measures fast Computer networks Security measures Congresses Information networks Security measures Congresses Electronic books |
subject_GND | (DE-588)1071861417 |
title | Aspects of network and information security |
title_auth | Aspects of network and information security |
title_exact_search | Aspects of network and information security |
title_full | Aspects of network and information security edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian |
title_fullStr | Aspects of network and information security edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian |
title_full_unstemmed | Aspects of network and information security edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian |
title_short | Aspects of network and information security |
title_sort | aspects of network and information security |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Information networks / Security measures fast Computer networks Security measures Congresses Information networks Security measures Congresses Electronic books |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Information networks / Security measures Computer networks Security measures Congresses Information networks Security measures Congresses Electronic books Konferenzschrift |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=244467 |
work_keys_str_mv | AT natoadvancedstudyinstituteonnetworksecurityandintrusiondetection2005yerevanarmenia aspectsofnetworkandinformationsecurity AT kranakisevangelos aspectsofnetworkandinformationsecurity AT haroutunianevguenia aspectsofnetworkandinformationsecurity AT shahbaziane aspectsofnetworkandinformationsecurity AT northatlantictreatyorganizationpublicdiplomacydivision aspectsofnetworkandinformationsecurity AT natoscienceforpeaceandsecurityprogramme aspectsofnetworkandinformationsecurity AT iospress aspectsofnetworkandinformationsecurity |