Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and pseudo code, which enable a user to identify if an application/protocol is vulnerable. This edited volume also includes case studies that discuss the latest exploits.
Voice over IP Security examines the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. The text also identifies current areas of risk and deficiencies in the research.
This is one of the first books to provide an overview of trust management for open service-oriented environments. It presents social network-based techniques for establishing trust in decentralized environments.
This is the first technical book exclusively focused on spyware/adware. It also includes defensive techniques. The book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.
Global in its scope and perspective, this publication features contributing authors from around the world in the first systematic, archival volume treatment of the field. They cover the very latest advances in research and practice in this vital area of study.
This monograph provides a wide-ranging and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field.
Elisa Bertino and her coauthors provide a comprehensive guide to security for Web services and SOA. They cover all standards addressing Web service security, as well as recent research on access control and advanced digital identity management techniques.
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It discusses securing current and next generation telecommunications networks.
This book details the SERENITY approach towards providing security and dependability solutions for dynamic, highly-distributed and heterogeneous systems. It covers the foundations of ambient systems and includes case studies.