Summer Sale: 50% off print & eBooks in Open Source & Security! Browse now >>

EC2ND 2006

Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis

Editors: Blyth, Andrew, Sutherland, Iain (Eds.)

Buy this book

eBook $119.00
price for USA (gross)
  • ISBN 978-1-84628-750-3
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $159.00
price for USA
  • ISBN 978-1-84628-749-7
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

This book contains the proceedings of the Second European Conference on Computer Network Defence that took place in December 2006 at the Faculty of Advanced Technology, University of Glamorgan, in the UK.

The theme of the conference was the protection of computer networks, with contributions from both national and international participants reporting on research developments, as well as providing valuable insights in this area.

The book also incorporates the proceedings of the First Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2006), held in conjunction with EC2ND 2006.

Topics and issues discussed include:

Computer Network Operations

Computer Network Attack

Network Application Security

Network Forensics

Web Security

Vulnerability Management and Tracking

Network Defence

Wireless and Mobile Security

Cryptography

Network Discovery and Mapping

Network Security

Intrusion Detection Systems

Incident Response and Management

Computer Forensics Practice

Malicious Software Analysis

Network Architectures and Management

Legal and Ethical Issues

The papers presented include contributions from leading figures in the fields of network security and computer forensics, and are a valuable source of reference for both researchers and practitioners.

Table of contents (12 chapters)

  • Efficient Sampling of the Structure of Crypto Generators’ State Transition Graphs

    Keller, Jörg

    Pages 3-12

  • Mandatory Access Control applications to web hosting

    Prandini, Marco (et al.)

    Pages 13-22

  • Outsourcing Security Services for Low Performance Portable Devices

    Szentgyörgyi, Attila (et al.)

    Pages 23-32

  • Public Verifiable Multi-sender Identity Based Threshold Signcryption

    Chen, Wen (et al.)

    Pages 33-42

  • A Discussion on the Role of Deception in Information Operations for the Defence of Computer Networks

    Kazmi, Zafar (et al.)

    Pages 43-52

Buy this book

eBook $119.00
price for USA (gross)
  • ISBN 978-1-84628-750-3
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $159.00
price for USA
  • ISBN 978-1-84628-749-7
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Bibliographic Information

Bibliographic Information
Book Title
EC2ND 2006
Book Subtitle
Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis
Editors
  • Andrew Blyth
  • Iain Sutherland
Copyright
2007
Publisher
Springer-Verlag London
Copyright Holder
Springer-Verlag London
eBook ISBN
978-1-84628-750-3
DOI
10.1007/978-1-84628-750-3
Softcover ISBN
978-1-84628-749-7
Edition Number
1
Number of Pages
VIII, 125
Topics