Short Courses of the 8th Brazilian Symposium on Information and Computational Systems Security

Authors

Carlos Alberto Maziero (ed)
PUCPR
Luciano Paschoal Gaspary (ed)
UFRGS
Raul Fernando Weber (ed)
UFRGS

Keywords:

Information Security, Computational Systems, Short Couses SBSeg 2008, SBSeg 2008

Synopsis

 The Brazilian Symposium on Information and Computational Systems Security (SBSeg) is a scientific event promoted annually by the Brazilian Computer Society (SBC). SBSeg represents the country’s main forum for disseminating research results and relevant activities related to information and computational systems security.

This book comprises the four chapters produced by the authors of the short courses selected for presentation at SBSeg 2008.

Chapter 1, "Gestão de Riscos", presents the security risks management process, with its advantages and limitations. This chapter includes the theoretical and practical aspects of the risks management, to create a knowledge base for the reader’s own projects. We expect this course contributes to the knowledge of the security risk management methodology.

Chapter 2, "Segurança em Redes Mesh: Tendências, Desafios e Aplicações", presents main problems, solutions and challenges for providing security in wireless mesh networks, in a theoretical way. This chapter has three main focuses: the mesh networks contextualization; Security issues in wireless mesh networks, with your challenges and deficiency and; the main proposals found in the literature.

Chapter 3, "Tráfego Internet não Desejado: Conceitos, Caracterização e Soluções", presents the unwanted traffic universe including definitions, classification, and the reasons that explain its growth. It also points out the shortcomings of the existent solutions for detection of unwanted traffic. Lastly, this chapter presents potential solutions and a list of research topics and open problems on unwanted Internet traffic.

Chapter 4, "Virtualização: Conceitos e Aplicações em Segurança", ​​presents the fundamental concepts about virtual machines, discusses advantages and drawbacks of using virtual machines in several application domains, explores the usage possibilities of virtual machines in the systems security area, and shows some examples of popular virtual machine environments.

Chapters

Downloads

Download data is not yet available.

Downloads

Publication date

September 1, 2008

Details about the available publication format: Full Volume

Full Volume

ISBN-13 (15)

978-85-7669-191-4