Compra 10 libros por 10 € aquí!
Bookbot

Javier Lopez

    Information Security
    Emerging Challenges for Security, Privacy and Trust
    The Gov Geeks Guide to Government Soft Skills
    Critical infrastructure protection
    Las Tres Esquinas Dobladas
    La figura de la bestia entre historia y profecı́a
    • La figura de la bestia entre historia y profecı́a

      Investigación teológico-bı́blica de Apocalipsis 13,1-18

      El contenido de Ap 13 ha sido estudiado desde diversos metodos exegeticos. Ha llamado la atencion, sobre todo, el simbolismo del numero 666 (v.18). Mas de veinte publicaciones solo sobre este verso, la mayoria de indole historico-critica, muestran la necesidad de un analisis literario que valore adecuadamente la simbologia tipica de este capitulo. Tal es el objetivo del presente estudio. El mensaje proferico se encuentra bien enraizado en la experiencia del autor de Ap 13. Sin embargo tiende, en su compleja estructuracion simbolica, a superar los eventos de origen abriendose a todos los tiempos. La figura de la bestia trasciende el punto de partida historico y ofrece hoy al cristiano un principio de discernimiento y de accion sapienciales ante el propio Neron y ante el propio imperio

      La figura de la bestia entre historia y profecı́a
    • Poesías del primer trimestre de 2018, surgidas de un encuentro en La Habana, que presentan versos de estructura sintética y diversos estilos. Se leen con rapidez y abordan temas sociales, políticos y culturales. La obra invita a la reflexión y a la escritura personal, reconociendo el potencial de cada individuo como "escritor".

      Las Tres Esquinas Dobladas
    • The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.

      Critical infrastructure protection
    • Emerging Challenges for Security, Privacy and Trust

      24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings

      • 460 páginas
      • 17 horas de lectura

      The 24th IFIP International Information Security Conference (SEC 2009), held in Pafos, Cyprus, showcased the commitment and expertise of information security professionals globally. With 176 submissions, only 39 papers were selected for presentation, reflecting a competitive acceptance rate of 22%. This volume compiles the chosen works, emphasizing the novelty and technical quality of the research. The conference also highlights the collaborative efforts of numerous volunteers who contributed to its success, set against the backdrop of Cyprus's natural beauty and rich history.

      Emerging Challenges for Security, Privacy and Trust
    • Information Security

      18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings

      • 583 páginas
      • 21 horas de lectura

      This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.

      Information Security
    • Information Security Practice and Experience

      11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings

      • 590 páginas
      • 21 horas de lectura

      This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015. The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.

      Information Security Practice and Experience
    • Risks and Security of Internet and Systems

      9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers

      • 275 páginas
      • 10 horas de lectura

      This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling.

      Risks and Security of Internet and Systems
    • This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).

      Network and system security
    • This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

      Applied cryptography and network security