Computer Security - ESORICS 2013

18th European Symposium on Research in Computer Security Egham, UK, September 2013, Proceedings



Bookstore > Books > Computer Security - ESORICS 2013

Computer Security - ESORICS 2013
Buy
Preview
Price$92.22 - $177.59
Rating
AuthorsJason Crampton, Sushil Jajodia, Keith Mayes
PublisherSpringer
Published2013
Pages794
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-10364240202X
ISBN-139783642402029
EBook Hardcover Paperback

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.

The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.




Similar Books


The Myths of Security

The Myths of Security

If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional John Viega reports on the sorry state of security, with concrete suggestions for professionals and individuals confronting the issue. Provocative, insightful, and often controversial, The My...
Principles of Computer Security, 5th Edition

Principles of Computer Security, 5th Edition

Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Writte...
Computer Security Handbook, 6th Edition

Computer Security Handbook, 6th Edition

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of comput...
The Practice of Network Security Monitoring

The Practice of Network Security Monitoring

Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Se...
Crafting the InfoSec Playbook

Crafting the InfoSec Playbook

Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own thre...
Machine Learning and Security

Machine Learning and Security

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you'll explore ways to apply machine learning to security is...