Explore the latest books of this year!
Bookbot

Markus Schumacher

    Hacker contest
    Sicherheit in Netzen und Medienströmen
    Security engineering with patterns
    • 2003

      Security engineering with patterns

      • 208 pages
      • 8 hours of reading

      For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement. This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security approaches. Based on the author's model and best practice in security patterns, security novices are now in a position to understand how security experts solve problems and can basically act like them by using the patterns available as building blocks for their designs.

      Security engineering with patterns
    • 2000

      Sicherheit in Netzen und Medienströmen

      • 201 pages
      • 8 hours of reading

      InhaltsverzeichnisI: Sicherheit in Netzen.A Distributed Firewall for Multimedia Applications.Integration der Schleusentechnologie „Lock-Keeper“ in moderne Sicherheitsarchitekturen.IPSec und IP Multicast.The Evolution of Mobile IP Towards Security.A Survey of Requirements and Standardization Efforts for IP-Telephony-Security.The Challenges of CORBA Security.Eine Sicherheitsinfrastruktur für das Virtuelle Projektbüro.A Framework for Comparing and Querying Certification Practice Statements.Mit Sicherheit Schutz vor dem bekannten Feind.II: Sicherheit in Medienströmen.Aspekte der Sicherheit multimedialer Daten und Anwendungen mittels Kryptographie und digitaler Wasserzeichentechniken.Asymmetric Watermarking Schemes.Handschriftliche Authentifikation für digitale Wasserzeichenverfahren.Digitale Wasserzeichen für unkomprimierte und komprimierte Audiodaten.Digitale Wasserzeichen für MIDI - Grundlagen und Konzepte.Optimierung eines Wasserzeichenverfahrens zum Einbringen von kundenspezifischen Informationen in digitales Datenmaterial.Robustheit und Sicherheit Wavelet-basierter Watermarking-Algorithmen.Wasserzeichen für Polygon basierte 3D Modelle.

      Sicherheit in Netzen und Medienströmen