Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 Proceedings
Paperback

Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 Proceedings

$276.99
Sign in or become a Readings Member to add this title to your wishlist.

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.

The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in the areas of security and its applications, including: * Network and Wireless Network Security * Mobile, Ad Hoc and Sensor Network Security * Peer-to-Peer Network Security * Database and System Security * Intrusion Detection and Prevention * Internet Security, and Applications Security and Network Management * E-mail Security, Spam, Phishing, E-mail Fraud * Virus, Worms, Trojon Protection * Security Threats and Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc. ) * Ubiquitous Computing Security * Web 2. 0 Security * Cryptographic Protocols * Performance Evaluations of Protocols and Security Application There were 182 submissions to the conference and the Program Committee selected 63 papers for publication. The book is organized as a collection of papers from the First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010), the First International Workshop on Database Management Systems (DMS- 2010), and the First International Workshop on Mobile, Wireless and Networks Security (MWNS-2010).

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO
Format
Paperback
Publisher
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Country
Germany
Date
7 July 2010
Pages
636
ISBN
9783642144776

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.

The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in the areas of security and its applications, including: * Network and Wireless Network Security * Mobile, Ad Hoc and Sensor Network Security * Peer-to-Peer Network Security * Database and System Security * Intrusion Detection and Prevention * Internet Security, and Applications Security and Network Management * E-mail Security, Spam, Phishing, E-mail Fraud * Virus, Worms, Trojon Protection * Security Threats and Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc. ) * Ubiquitous Computing Security * Web 2. 0 Security * Cryptographic Protocols * Performance Evaluations of Protocols and Security Application There were 182 submissions to the conference and the Program Committee selected 63 papers for publication. The book is organized as a collection of papers from the First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010), the First International Workshop on Database Management Systems (DMS- 2010), and the First International Workshop on Mobile, Wireless and Networks Security (MWNS-2010).

Read More
Format
Paperback
Publisher
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Country
Germany
Date
7 July 2010
Pages
636
ISBN
9783642144776