This is a comprehensive text on intrusion detection. It offers reviews of the fundamentals in the field and covers all the latest developments. Too, it provides case studies at the end of each chapter.
This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems. It does this by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms.
This book discusses Security Certification Standards and establishes the need to certify open source tools and applications. This includes the international standard for the certification of IT products Common Criteria (ISO/IEC 15408) (CC 2006).
Here is a comprehensive approach to protecting highly sensitive information stored on systems outside the data owner’s control. The approach illustrated combines access control and encryption, allowing the data owner to outsource the security policy itself.
With a focus on the technical issues related to digital privacy and information management, this book is an in-depth examination of how different privacy mechanisms are motivated, designed, analyzed, tested and finally implemented in companies or institutions.
This book proposes a number of techniques to perform data mining tasks in a privacy-preserving way. The survey information included with each chapter is unique in terms of its focus on introducing the different topics more comprehensively.
This book introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection, and limits the recovery of personal data. Includes case studies and solutions, with algorithms.