Головна Спрощенний режим Опис Шлюз Z39.50
Авторизація
Прізвище
Пароль
 

Бази даних


Доступ до повнотекстових книг Springer Nature (через IP-адреси БДМУ) - результати пошуку

Вид пошуку

Зона пошуку
у знайденому
Формат представлення знайдених документів:
повнийінформаційнийкороткий
Відсортувати знайдені документи за:
авторомназвоюроком виданнятипом документа
Пошуковий запит: (<.>S=Computer security.<.>)
Загальна кiлькiсть документiв : 202
Показанi документи с 1 за 20
 1-20    21-40   41-60   61-80   81-100   101-120      
1.


   
    Cyber Security. Simply. Make it Happen. [[electronic resource] :] : leveraging Digitization Through IT Security / / ed. Abolhassan, Ferri. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 127 p. 21 illus. - Б. ц.
    Зміст:
Security: The Real Challenge for Digitalization --
Security Policy: Regulations for Cyberspace --
Data Protection Empowerment --
Red Teaming and Wargaming.How can Management and Supervisory Board Members Become More Involved in Cybersecurity --
The Law and its Contribution to IT Security: Legal Framework, Requirements, Limits --
IT Security: Stronger Together --
The German Security Market: Searching for the Complete Peace-of-Mind Service --
CSP, not 007: Integrated Cybersecurity Skills Training. Human Factors in IT Security --
Secure and Simple: Plug-and-Play Security --
Cybersecurity - What's Next --
Conclusion.  .
Рубрики: Management information systems.
   Management.

   Industrial management.

   Computer science.

   Computer security.

   Business IT Infrastructure.

   Innovation/Technology Management.

   Management of Computing and Information Systems.

   Systems and Data Security.

Анотація: Authors from the fields of politics, business, research and development examine the issue of security in this book. What will it cost and who will provide it? Can security perhaps even be fun? Digitization is permanently changing how we live and work. It is associated with speed and cost efficiency improvements, but it also increases the vulnerability to attack of both individuals and enterprises. To ensure that digitization can continue to drive efficiency, the maximum possible protection of data, networks and data centres, as well as devices and sensors in the Internet of Things, is essential. Humans and human behaviour are key to this, which is why future security concepts will have to be easy to use for everyone - from pensioners, housewives and students to small businesses and major corporations.   Content Security: The Real Challenge for Digitalization Security Policy: Rules for Cyberspace Data Protection Empowerment Red Teaming and Wargaming: How Can Management and Supervisory Board Members Become More Involved in Cybersecurity? CSP, not 007: Integrated Cybersecurity Skills Training Secure and Simple: Plug-and-Play Security Cybersecurity – What‘s next?   The Editor Dr. Ferri Abolhassan is Director of T-Systems International GmbH, responsible for the IT Division and Telekom Security. He has authored various publications on IT markets and trends.

Перейти: https://doi.org/10.1007/978-3-319-46529-6

Дод.точки доступу:
Abolhassan, Ferri. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

2.


    Sinha, Sudhi R.
    Building an Effective IoT Ecosystem for Your Business [[electronic resource] /] : монография / Sudhi R. Sinha, Park, Youngchoon. ; . - 1st ed. 2017. - [S. l. : s. n.]. - XVII, 278 p. 93 illus., 84 illus. in color. - Б. ц.
    Зміст:
1 Preface --
2 Building an IoT framework --
3 Making devices smart --
4 Creating smart gateways --
5 Building network services --
6 Managing devices --
7 Performing data routing and real time analysis --
8 Constructing data service platform --
9 Performing analytics --
10 Creating delivery enablement --
11 Establishing a business support ecosystem --
12 Dealing with security, privacy, access control, and compliance --
13 Strengthening your technology and partner ecosystem --
14 Developing and improving user experiences --
15 Marketing your IoT initiatives --
16 Monetizing your IoT efforts --
17 Building a winning team to build successful IoT enabled product --
18 Measuring the effectiveness of your IoT ecosystem.
Рубрики: Application software.
   Electrical engineering.

   Management information systems.

   Computer security.

   Information Systems Applications (incl. Internet).

   Communications Engineering, Networks.

   Business Information Systems.

   Systems and Data Security.

Анотація: This descriptive, practical guide explains how to build a commercially impactful, operationally effective and technically robust IoT ecosystem that takes advantage of the IoT revolution and drives business growth in the consumer IoT as well as industrial internet spaces. With this book, executives, business managers, developers and decision-makers are given the tools to make more informed decisions about IoT solution development, partner eco-system design, and the monetization of products and services. Security and privacy issues are also addressed. Readers will explore the design guidelines and technology choices required to build commercially viable IoT solutions, but also uncover the various monetization and business modeling for connected products.

Перейти: https://doi.org/10.1007/978-3-319-57391-5

Дод.точки доступу:
Park, Youngchoon.; Sinha, Sudhi R. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

3.


   
    Applications and Techniques in Information Security [[electronic resource] :] : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings / / ed. Batten, Lynn. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 223 p. 68 illus. - Б. ц.
    Зміст:
Keynote Speeches --
Crypto Algorithms and Applications --
Attacks --
Malware and Malicious Events Detection --
System and Network Security.
Рубрики: Computer security.
   Data encryption (Computer science).

   Algorithms.

   Systems and Data Security.

   Cryptology.

   Algorithm Analysis and Problem Complexity.

Анотація: This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.

Перейти: https://doi.org/10.1007/978-981-10-5421-1

Дод.точки доступу:
Batten, Lynn. \ed.\; Kim, Dong Seong. \ed.\; Zhang, Xuyun. \ed.\; Li, Gang. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

4.


   
    Computational Intelligence, Communications, and Business Analytics [[electronic resource] :] : first International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part II / / ed.: Mandal, J. K., Dutta, Paramartha., Mukhopadhyay, Somnath. - 1st ed. 2017. - [S. l. : s. n.]. - XXXI, 631 p. 307 illus. - Б. ц.
    Зміст:
Data science and advanced data analytics --
Signal processing and communications --
Microelectronics, sensors, intelligent networks --
Computational forensics (privacy and security) --
Computational intelligence in bio-computing --
Computational intelligence in mobile and quantum computing --
Intelligent data mining and data warehousing --
Computational intelligence.
Рубрики: Data structures (Computer science).
   Computer security.

   Computers.

   Data Structures and Information Theory.

   Systems and Data Security.

   Information Systems and Communication Service.

Анотація: The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2017, held in Kolkata, India, in March 2017. The 90 revised full papers presented in the two volumes were carefully reviewed and selected from 276 submissions. The papers are organized in topical sections on data science and advanced data analytics; signal processing and communications; microelectronics, sensors, intelligent networks; computational forensics (privacy and security); computational intelligence in bio-computing; computational intelligence in mobile and quantum computing; intelligent data mining and data warehousing; computational intelligence.  .

Перейти: https://doi.org/10.1007/978-981-10-6430-2

Дод.точки доступу:
Mandal, J. K. \ed.\; Dutta, Paramartha. \ed.\; Mukhopadhyay, Somnath. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

5.


    Bultan, Tevfik.
    String Analysis for Software Verification and Security [[electronic resource] /] : монография / Tevfik. Bultan, Yu, Fang., Alkhalaf, Muath., Aydin, Abdulbaki. ; . - 1st ed. 2017. - [S. l. : s. n.]. - IX, 174 p. 74 illus., 6 illus. in color. - Б. ц.
    Зміст:
1 Introduction: String Manipulating Programs and Difficulty of Their Analysis --
2 String Manipulating Programs and Difficulty of Their Analysis --
3 State Space Exploration --
4 Automata Based String Analysis --
5 Relational String Analysis --
6 Abstraction and Approximation --
7 Constraint-based String Analysis --
8 Vulnerability Detection and Sanitization Synthesis --
9 Differential String Analysis and Repair --
10 Tools --
11 A Brief Survey of Related Work --
12 Conclusions.
Рубрики: Computer security.
   Programming languages (Electronic computers).

   Software engineering.

   Computer logic.

   Mathematical logic.

   Computer science—Mathematics.

   Systems and Data Security.

   Programming Languages, Compilers, Interpreters.

   Software Engineering.

   Logics and Meanings of Programs.

   Mathematical Logic and Formal Languages.

   Symbolic and Algebraic Manipulation.

Анотація: This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis. String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text. .

Перейти: https://doi.org/10.1007/978-3-319-68670-7

Дод.точки доступу:
Yu, Fang.; Alkhalaf, Muath.; Aydin, Abdulbaki.; Bultan, Tevfik. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

6.


   
    Information Security Education for a Global Digital Society [[electronic resource] :] : 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings / / ed. Bishop, Matt. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XII, 169 p. 20 illus. - Б. ц.
Рубрики: Education—Data processing.
   Computer security.

   Educational technology.

   Application software.

   Teaching.

   Computers and Education.

   Systems and Data Security.

   Educational Technology.

   Computer Appl. in Social and Behavioral Sciences.

   Teaching and Teacher Education.

Анотація: This book constitutes the refereed proceedings of the 10th IFIP WG 11.8 World Conference on Security Education, WISE 10, held in Rome, Italy, in May 2017. The 14 revised papers presented were carefully reviewed and selected from 31 submissions. They represent a cross section of applicable research as well as case studies in security education and are organized in the following topical sections: information security education; teaching information security; information security awareness and culture; and training information security professionals.

Перейти: https://doi.org/10.1007/978-3-319-58553-6

Дод.точки доступу:
Bishop, Matt. \ed.\; Futcher, Lynn. \ed.\; Miloslavskaya, Natalia. \ed.\; Theocharidou, Marianthi. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

7.


   
    Systems, Software and Services Process Improvement [[electronic resource] :] : 24th European Conference, EuroSPI 2017, Ostrava, Czech Republic, September 6–8, 2017, Proceedings / / ed. Stolfa, Jakub. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XX, 688 p. 186 illus. - Б. ц.
    Зміст:
SPI and VSEs --
SPI and process models --
SPI and safety --
SPI and project management --
SPI and implementation --
SPI issues --
SPI and automotive --
Selected key notes and workshop papers --
GamifySPI --
SPI in Industry 4.0 --
Best practices in implementing traceability --
Good and bad practices in improvement --
Safety and security --
Experiences with agile and lean --
Standards and assessment models --
Team skills and diversity strategies.
Рубрики: Management information systems.
   Computer science.

   Software engineering.

   Information technology.

   Business—Data processing.

   Computers.

   Computer system failures.

   Computer security.

   Management of Computing and Information Systems.

   Software Engineering.

   IT in Business.

   The Computing Profession.

   System Performance and Evaluation.

   Systems and Data Security.

Анотація: This volume constitutes the refereed proceedings of the 24th EuroSPI conference, held in Ostrava, Czech Republic, in September 2017. The 56 revised full papers presented were carefully reviewed and selected from 97 submissions. They are organized in topical sections on SPI and VSEs, SPI and process models, SPI and safety, SPI and project management, SPI and implementation, SPI issues, SPI and automotive, selected key notes and workshop papers, GamifySPI, SPI in Industry 4.0, best practices in implementing traceability, good and bad practices in improvement, safety and security, experiences with agile and lean, standards and assessment models, team skills and diversity strategies.

Перейти: https://doi.org/10.1007/978-3-319-64218-5

Дод.точки доступу:
Stolfa, Jakub. \ed.\; Stolfa, Svatopluk. \ed.\; O'Connor, Rory V. \ed.\; Messnarz, Richard. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

8.


   
    Cloud Computing and Services Science [[electronic resource] :] : 6th International Conference, CLOSER 2016, Rome, Italy, April 23-25, 2016, Revised Selected Papers / / ed. Helfert, Markus. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 383 p. 135 illus. - Б. ц.
    Зміст:
Invited Papers --
Supporting Users in Data Outsourcing and Protection in the Cloud --
Native Cloud Applications: Why Monolithic Virtualization is Not their Foundation --
Papers --
Delegated Audit of Cloud Provider Chains using Provider Provisioned Mobile Evidence Collection --
Trade-offs based Decision System for Adoption of Cloud-based Services --
Toward Proactive Learning of Multi-layered Cloud Service based Application --
Map Reduce Autoscaling over the Cloud with Process Mining Monitoring --
Detecting Anomaly in Cloud Platforms using a Wavelet-based Framework --
Security SLA in Next Generation Data Centers, the SPECS Approach --
Dynamically Loading Mobile/Cloud Assemblies --
Investigation of Impacts on Network Performance in the Advance of a Microservice Design --
An Universal Approach for Compliance Management Using Compliance Descriptors --
Fostering the Reuse of TOSCA-based Applications by Merging BPEL Management Plans --
Experimental Study on Performance and Energy Consumption of Hadoop in Cloud Environments --
Towards a Framework for Privacy-preserving Data Sharing in Portable Clouds --
Cost Analysis Comparing HPC Public Versus Private Cloud Computing --
Ming: Model- and View-based Deployment and Adaptation of Cloud Datacenters --
A Generic Framework for Representing Context-aware Security Policies in the Cloud --
Towards Outsourced and Individual Service Consumption Clearing in Connected Mobility Solutions.
Рубрики: Software engineering.
   Information technology.

   Business—Data processing.

   Application software.

   Computer security.

   Data mining.

   E-commerce.

   Software Engineering.

   IT in Business.

   Information Systems Applications (incl. Internet).

   Systems and Data Security.

   Data Mining and Knowledge Discovery.

   e-Commerce/e-business.

Анотація: This book constitutes extended, revised and selected papers from the 6th International Conference on Cloud Computing and Services Science, CLOSER 2016, held in Rome, Italy, in April 2016. The 16 papers presented in this volume were carefully reviewed and selected from a total of 123 submissions. The volume also contains two invited papers. CLOSER 2016 focused on the emerging area of cloud computing, inspired by recent advances related to infrastructures, operations, and service availability through global networks. It also studied the influence of service science in this area.

Перейти: https://doi.org/10.1007/978-3-319-62594-2

Дод.точки доступу:
Helfert, Markus. \ed.\; Ferguson, Donald. \ed.\; Mendez Munoz, Victor. \ed.\; Cardoso, Jorge. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

9.


   
    Security and Privacy in Communication Networks [[electronic resource] :] : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings / / ed. Deng, Robert. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 781 p. 256 illus. - Б. ц.
Рубрики: Computer security.
   Data protection.

   Data encryption (Computer science).

   Computer communication systems.

   Computers and civilization.

   Artificial intelligence.

   Systems and Data Security.

   Security.

   Cryptology.

   Computer Communication Networks.

   Computers and Society.

   Artificial Intelligence.

Анотація: This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016. The 32 revised full papers and 18 poster papers were carefully reviewed and selected from 137 submissions. The papers are organized thematically starting with mobile and network security, followed by applied cryptography, web security and privacy, system security, hardware security. The volume also includes papers from the ATCS workshop and the poster session.

Перейти: https://doi.org/10.1007/978-3-319-59608-2

Дод.точки доступу:
Deng, Robert. \ed.\; Weng, Jian. \ed.\; Ren, Kui. \ed.\; Yegneswaran, Vinod. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

10.


   
    Industrial IoT Technologies and Applications [[electronic resource] :] : second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25–26, 2017, Proceedings / / ed.: Chen, Fulong., Luo, Yonglong. - 1st ed. 2017. - [S. l. : s. n.]. - XVII, 248 p. 131 illus. - Б. ц.
    Зміст:
Bound Analysis for Anchor Selection in Cooperative Localization --
Recharging route scheduling for wireless sensor network through particle swarm optimization --
Tracking movement target by using WebGIS on video surveillance system,- Mobile Attitude Transmission and Aircraft Control Strategies Based on WIFI --
Optimization bottleneck analysis in GPU-based aiming at SAR Imaging --
Research based on data processing technology of Industrial Internet of Things --
An Optimized Clustering Method with Improved Cluster Center for Social Network based on Gravitational Search Algorithm --
Elastic Resource Provisioning System Based on OpenStack Cloud Platform --
Edge affine invariant moment for texture image feature extraction --
Intelligent Private Fitness System based on ARM and Hybrid Internet of Things --
Research and Application of Security and Privacy in Industrial Internet of Things Based on Fingerprint Encryption --
Improved Reversible Data Hiding Scheme Based on AMBTC Compression Technique --
Link-based Privacy-preserving Data Aggregation Scheme in Wireless Sensor Networks --
Reversible Authentication of Wireless Sensor Network Based on Prediction-Error Histogram and CRC --
Heterogeneous Component Model for Architecture of Community Medical Internet of Things --
A Novel Grouping-based WSN Clustering Data Transmission Protocol --
An Improved DV-Hop Localization Algorithm via Inverse Distance Weighting Method in Wireless Sensor Networks --
Study on Electromagnetic Scattering Characteristics of Bodies of Revolution by Compressive Sensing --
An Inside Look at IoT Malware --
Design of OPC/DDP-Based Remote Monitoring System for Environmental Protection of the IoT --
Smart home monitoring system based on SOC --
Improved One-Round Phrase Search Schemes over Symmetrically Encrypted Data in Storage Outsourcing System --
A 0.6-2.4GHz Broadband GaN HEMT Power Amplifier with 79.8% Maximum Drain Efficiency --
Dynamic research on 2-Stage Reluctance Electromagnetic Launcher --
Characteristic, Architecture, Technology, and Design Methodology of Cyber-Physical Systems.
Рубрики: Special purpose computers.
   Computer communication systems.

   Application software.

   Computer security.

   Optical data processing.

   Data protection.

   Special Purpose and Application-Based Systems.

   Computer Communication Networks.

   Information Systems Applications (incl. Internet).

   Systems and Data Security.

   Image Processing and Computer Vision.

   Security.

Анотація: This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial IoT Technologies and Applications, IoT 2017, held in Wuhu, China, in March 2017. The volume contains 25 papers carefully reviewed and selected from 41 submissions focusing on topics such as big data, cloud computing, Internet of things, areas of control, mobile computing, and security.

Перейти: https://doi.org/10.1007/978-3-319-60753-5

Дод.точки доступу:
Chen, Fulong. \ed.\; Luo, Yonglong. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

11.


   
    Critical Infrastructure Protection XI [[electronic resource] :] : 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers / / ed.: Rice, Mason., Shenoi, Sujeet. - 1st ed. 2017. - [S. l. : s. n.]. - XVI, 338 p. 116 illus. - Б. ц.
Рубрики: Computer security.
   Data protection.

   Management information systems.

   Computer science.

   Special purpose computers.

   Computers and civilization.

   Computer simulation.

   Systems and Data Security.

   Security.

   Management of Computing and Information Systems.

   Special Purpose and Application-Based Systems.

   Computers and Society.

   Simulation and Modeling.

Анотація: The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.  Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XI describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection.  Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.  Areas of coverage include: Infrastructure Protection, Infrastructure Modeling and Simulation, Industrial Control System Security, and Internet of Things Security. This book is the eleventh volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection.  The book contains a selection of sixteen edited papers from the Eleventh Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2017. Critical Infrastructure Protection XI is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Перейти: https://doi.org/10.1007/978-3-319-70395-4

Дод.точки доступу:
Rice, Mason. \ed.\; Shenoi, Sujeet. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

12.


   
    Trusted Computing and Information Security [[electronic resource] :] : 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings / / ed. Xu, Ming. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 410 p. 133 illus. - Б. ц.
    Зміст:
Theory of trusted computing, trustworthy software --
Infrastructure of trusted computing, application and evaluation of trusted computing --
Network security and communication security --
Theory and technology of cryptographic techniques --
Information content security --
System security for mobile network and IoT systems, industrial control and embedded systems --
Security for Cloud computing, virtualization systems and big data.
Рубрики: Computer security.
   Data encryption (Computer science).

   Data protection.

   Computer software—Reusability.

   Systems and Data Security.

   Cryptology.

   Security.

   Performance and Reliability.

Анотація: This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.

Перейти: https://doi.org/10.1007/978-981-10-7080-8

Дод.точки доступу:
Xu, Ming. \ed.\; Qin, Zheng. \ed.\; Yan, Fei. \ed.\; Fu, Shaojing. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

13.


   
    Computational Intelligence, Communications, and Business Analytics [[electronic resource] :] : first International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part I / / ed.: Mandal, J. K., Dutta, Paramartha., Mukhopadhyay, Somnath. - 1st ed. 2017. - [S. l. : s. n.]. - XXXI, 595 p. 295 illus. - Б. ц.
    Зміст:
Data science and advanced data analytics --
Signal processing and communications --
Microelectronics, sensors, intelligent networks --
Computational forensics (privacy and security) --
Computational intelligence in bio-computing --
Computational intelligence in mobile and quantum computing --
Intelligent data mining and data warehousing --
Computational intelligence.
Рубрики: Data structures (Computer science).
   Computer security.

   Computers.

   Data Structures and Information Theory.

   Systems and Data Security.

   Information Systems and Communication Service.

Анотація: The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2017, held in Kolkata, India, in March 2017. The 90 revised full papers presented in the two volumes were carefully reviewed and selected from 276 submissions. The papers are organized in topical sections on data science and advanced data analytics; signal processing and communications; microelectronics, sensors, intelligent networks; computational forensics (privacy and security); computational intelligence in bio-computing; computational intelligence in mobile and quantum computing; intelligent data mining and data warehousing; computational intelligence.  .

Перейти: https://doi.org/10.1007/978-981-10-6427-2

Дод.точки доступу:
Mandal, J. K. \ed.\; Dutta, Paramartha. \ed.\; Mukhopadhyay, Somnath. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

14.


   
    Mobile Networks and Management [[electronic resource] :] : 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Proceedings / / ed. Aguero, Ramon. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - X, 229 p. 98 illus. - Б. ц.
    Зміст:
Spatial Keyword Query Processing in the Internet of Vehicles --
Recovering Request Patterns to a CPU Processor From Observed CPU Consumption Data --
Impacts of Radio Irregularity on Duty-cycled Industrial Wireless Sensor Networks --
Security Visualization: Detecting Denial Of Service --
Latency in Cascaded Wired / Wireless Communication Networks for Factory Automation --
Network Topology Exploration for Industrial Networks --
An Improved Robust Low Cost Approach for Real Time Vehicle Positioning in a Smart City --
Effect of Network Architecture Changes on OCSVM based Intrusion Detection System --
Smart Behavioral Filter for SCADA Network --
Adaptive Down-Sampling and Super-Resolution for Additional Video Compression --
Improving classification of tweets using linguistic information from a large external corpus --
Walking into Videos --
Mobile Agent Itinerary Planning Approaches in Wireless Sensor Networks- State of the Art and Current Challenges --
Mood-based On-Car Music Recommendations --
Automatic detection of hateful comments in online discussion.
Рубрики: Computer communication systems.
   Application software.

   Computer system failures.

   Data protection.

   Special purpose computers.

   Computer security.

   Computer Communication Networks.

   Information Systems Applications (incl. Internet).

   System Performance and Evaluation.

   Security.

   Special Purpose and Application-Based Systems.

   Systems and Data Security.

Анотація: This book constitutes the refereed post-conference proceedings of the 8th International Conference on Mobile Networks and Management, MONAMI 2016, held in Abu Dhabi, United Arab Emirates, in October 2016. The 14 revised full papers were carefully reviewed and selected from 18 submissions. The papers are organized thematically in four parts, starting with cloud computing and software defined networking followed by Internet-of-the-things, vehicular networks and novel techniques and algorithms.

Перейти: https://doi.org/10.1007/978-3-319-52712-3

Дод.точки доступу:
Aguero, Ramon. \ed.\; Zaki, Yasir. \ed.\; Wenning, Bernd-Ludwig. \ed.\; Forster, Anna. \ed.\; Timm-Giel, Andreas. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

15.


    Dasgupta, Dipankar.
    Advances in User Authentication [[electronic resource] /] : монография / Dipankar. Dasgupta, Roy, Arunava., Nag, Abhijit. ; . - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 360 p. 165 illus., 128 illus. in color. - Б. ц.
    Зміст:
Authentication Basics --
Biometric Authentication --
Negative Authentication Systems --
Pseudo-Passwords and Non-Textual Approaches --
Multi-Factor Authentication --
Continuous Authentication --
Adaptive Multi-Factor Authentication.
Рубрики: Coding theory.
   Information theory.

   Computer security.

   Data structures (Computer science).

   Biometrics (Biology).

   Coding and Information Theory.

   Systems and Data Security.

   Data Storage Representation.

   Biometrics.

Анотація: This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such as devices, media and surrounding conditions, like light, noise, etc. The book is divided into several parts that cover descriptions of several biometric and non-biometric authentication modalities, single factor and multi-factor authentication systems (mainly, adaptive), negative authentication system, etc. Adaptive strategy ensures the incorporation of the existing environmental conditions on the selection of authentication factors and provides significant diversity in the selection process. The contents of this book will prove useful to practitioners, researchers and students. The book is suited to be used a text in advanced/graduate courses on User Authentication Modalities. It can also be used as a textbook for professional development and certification coursework for practicing engineers and computer scientists. .

Перейти: https://doi.org/10.1007/978-3-319-58808-7

Дод.точки доступу:
Roy, Arunava.; Nag, Abhijit.; Dasgupta, Dipankar. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

16.


   
    Research Advances in Cloud Computing [[electronic resource] /] : монография / ed.: Chaudhary, Sanjay., Somani, Gaurav., Buyya, Rajkumar. - 1st ed. 2017. - [S. l. : s. n.]. - XX, 465 p. 126 illus., 81 illus. in color. - Б. ц.
    Зміст:
Chapter 1. Towards Performance and Dependability Bench marking of Cloud Computing --
Chapter 2. Big data Security and Privacy Issues in Cloud --
Chapter 3. Resource Allocation in Cloud Computing: Concepts, State of-the-art, and Research Challenges --
Chapter 4. Key management hierarchies for data access control in cloud --
Chapter 5. Accounting models in Cloud Computing --
Chapter 6. Data Analytics in Cloud-A streaming approach --
Chapter 7. Infrastructure Cloud and Performance --
Chapter 8. Cloud Computing for Big Data Analytics --
Chapter 9. Cloud Storage Techniques --
Chapter 10. Identity and Permission Management Challenges for Platform Services in Cloud computing --
Chapter 11. Container-based virtualization and security concerns in them --
Chapter 12. Applications of trusted computing in cloud computing --
Chapter 13. Investigating the possibility of data leakage in time of live VM migration --
Chapter 14. How Cloud Computing Can Transform Businesses? --
Chapter 15. Brokering of Cloud Services --
Chapter 16. Virtualization Security --
Chapter 17. Cloud Service Monitoring-Open Issues and Research Directions.
Рубрики: Computer communication systems.
   Computer hardware.

   Computer security.

   Application software.

   Computer Communication Networks.

   Computer Hardware.

   Systems and Data Security.

   Information Systems Applications (incl. Internet).

Анотація: This book addresses the emerging area of cloud computing, providing a comprehensive overview of the research areas, recent work and open research problems. The move to cloud computing is no longer merely a topic of discussion; it has become a core competency that every modern business needs to embrace and excel at. It has changed the way enterprise and internet computing is viewed, and this success story is the result of the long-term efforts of computing research community around the globe. It is predicted that by 2026 more than two-thirds of all enterprises across the globe will be entirely run in cloud. These predictions have led to huge levels of funding for research and development in cloud computing and related technologies. Accordingly, universities across the globe have incorporated cloud computing and its related technologies in their curriculum, and information technology (IT) organizations are accelerating their skill-set evolution in order to be better prepared to manage emerging technologies and public expectations of the cloud, such as new services.

Перейти: https://doi.org/10.1007/978-981-10-5026-8

Дод.точки доступу:
Chaudhary, Sanjay. \ed.\; Somani, Gaurav. \ed.\; Buyya, Rajkumar. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

17.


    Forster, David.
    Verifiable Privacy Protection for Vehicular Communication Systems [[electronic resource] /] : монография / David. Forster ; . - 1st ed. 2017. - [S. l. : s. n.]. - XV, 150 p. 30 illus., 13 illus. in color. - Б. ц.
    Зміст:
A Large-scale Evaluation of Pseudonym Change Strategies --
A Pseudonym System with Strong Privacy Guarantees --
An Application for Privacy-preserving Analysis of Traffic Flows.
Рубрики: Computer security.
   Computer organization.

   Automotive engineering.

   Data structures (Computer science).

   Systems and Data Security.

   Computer Systems Organization and Communication Networks.

   Automotive Engineering.

   Data Structures and Information Theory.

Анотація: David Forster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems – motivated by the large number of recent security incidents and revelations about mass surveillance. The author aims for verifiable privacy protection enforced through cryptographic and technical means, which safeguards user data even if back-end systems are not fully trusted. Forster applies advanced cryptographic concepts, such as anonymous credentials, and introduces a novel decentralized secret sharing algorithm to fulfill complex and seemingly contradicting requirements in several vehicle-to-x application scenarios. Many of the concepts and results can also be applied to other flavors of internet of things systems. Contents A Large-scale Evaluation of Pseudonym Change Strategies A Pseudonym System with Strong Privacy Guarantees An Application for Privacy-preserving Analysis of Traffic Flows Target Groups Researchers and students in the field of vehicular ad-hoc networks, mobile ad-hoc networks, privacy, security, and distributed systems Practitioners in the field of vehicle-to-x communication, vehicle telematics, internet of things, privacy, and security About the Author David Forster completed his dissertation at Ulm University while working in the Corporate Research department of a leading German automotive supplier. He has worked as a consultant for IT security for several years and holds a degree in Computer Science from the Karlsruhe Institute of Technology.

Перейти: https://doi.org/10.1007/978-3-658-18550-3

Дод.точки доступу:
Forster, David. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

18.


   
    Resilience and Risk [[electronic resource] :] : methods and Application in Environment, Cyber and Social Domains / / ed.: Linkov, Igor., Palma-Oliveira, Jose Manuel. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 580 p. 131 illus. - Б. ц.
    Зміст:
Part 1: Introduction --
Chapter 1. An Introduction to Resilience for Critical Infrastructures (Igor Linkov) --
Part 2: Methods --
Chapter 2: Towards a generic resilience management (Ivo Haring) --
Chapter 3: Redesigning Resilient Infrastructure Research (Thomas P Seager) --
Chapter 4: Designing Resilient Systems (Scott Jackson) --
Part 3: Infrastructure --
Chapter 5: Infrastructure Resilience Assessment, Management (Hans R Heinimann) --
Chapter  6: Engineering Resilience in Critical Infrastructures (Giovanni Sansavini) --
Chapter  7: Seaport Climate Vulnerability Assessment at the Multi-Port Scale (Robert McIntosh) --
Chapter 8: Resilience of Critical Infrastructures (Paolo Trucco) --
Part 4: Social --
Chapter 9: Social Resilience and Critical Infrastructure Systems (Benjamin Trump) --
Chapter 10: Societal Resilience: From Theory to Policy and Practice (Meir Elran) --
Chapter 11: Planning Resilient Communities (Alexander Hay) --
Chapter 12: Integration of Risk and Resilience into Policy (Charles Baubion) --
Chapter 13: Realising critical infrastructure resilience (Jon Coaffee) --
Part 5: Cyber --
Chapter 14: Bridging the Gap from Cyber Security to Resilience (Paul Roege) --
Chapter 15: Cyber-Transportation Resilience (Maria Nogal) --
Chapter 16: Resilience and Fault Tolerance (Niels P. Zussblatt) --
Part 6: Applications --
Chapter  17: Building Resilience through Risk Analysis (Philip O'Neill) --
Chapter 18: Enhancing Organizational Resilience through Risk (Dalila Antunes) --
Chapter 19: Integrative Education Model for Resources (Dejan Vasovic) --
Chapter 20: Valuation of Imminence Analysis (Eugene Piechoczek) --
Chapter 21: Resilience needs in NATO Partner Countries (Ahmed A Hady) --
Chapter 22: Contribution to Enhancement of Critical Infrastructure (Branislav Todorovic) --
Chapter 23: Risk and Resiliency Assessment of Urban Groundwater Supply Sources (Zorica Srdjevic) --
Chapter 24: Simulating Reservoir System Operation Under Given Scenarios (Bojan Srdjevic). .
Рубрики: Data protection.
   Environmental policy.

   Public safety.

   Environmental management.

   Computer security.

   System safety.

   Security.

   Environmental Policy.

   Crime Control and Security.

   Environmental Management.

   Systems and Data Security.

   Security Science and Technology.

Анотація: This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry, government and academia in the new and emerging field of resilience in order to provide a more comprehensive and universal understanding of how resilience methodology can be applied in various disciplines and applications. This book advocates for a systems-driven view of resilience in applications ranging from cyber security to ecology to social action, and addresses resilience-based management in infrastructure, cyber, social domains and methodology and tools. Risk and Resilience has been written to open up a transparent dialog on resilience management for scientists and practitioners in all relevant academic disciplines and can be used as supplement in teaching risk assessment and management courses.

Перейти: https://doi.org/10.1007/978-94-024-1123-2

Дод.точки доступу:
Linkov, Igor. \ed.\; Palma-Oliveira, Jose Manuel. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

19.


   
    ICT Systems Security and Privacy Protection [[electronic resource] :] : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings / / ed.: De Capitani di Vimercati, Sabrina., Martinelli, Fabio. - 1st ed. 2017. - [S. l. : s. n.]. - XVI, 586 p. 159 illus. - Б. ц.
Рубрики: Computer security.
   Data encryption (Computer science).

   Application software.

   Computers and civilization.

   Computers.

   Law and legislation.

   Systems and Data Security.

   Cryptology.

   Information Systems Applications (incl. Internet).

   Computers and Society.

   Legal Aspects of Computing.

   Computer Applications.

Анотація: This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.

Перейти: https://doi.org/10.1007/978-3-319-58469-0

Дод.точки доступу:
De Capitani di Vimercati, Sabrina. \ed.\; Martinelli, Fabio. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

20.


    Martellini, Maurizio.
    Information Security of Highly Critical Wireless Networks [[electronic resource] /] : монография / Maurizio. Martellini, Abaimov, Stanislav., Gaycken, Sandro., Wilson, Clay. ; . - 1st ed. 2017. - [S. l. : s. n.]. - VII, 73 p. 1 illus. - Б. ц.
    Зміст:
Introduction --
What is Highly Critical Wireless Networking (HCWN) --
Applications for HCWN --
Vulnerabilities and Security Issues --
Modeling Threats and Risks --
Modeling Vulnerabilities --
Governance and Management Frameworks --
Security Technologies for Networked Devices --
Known Weaknesses with Security Controls --
Competent Reliable Operation of HCWN --
Assessing the Effectiveness and Efficiency of Security Approaches --
Examples in Brief --
Testing the Resilience of HCWN --
Future Attack Patterns --
Assessing Cyber Attacks against Wireless Networks for the Next Global Internet of Things Revolution --
Conclusion.
Рубрики: Computer security.
   Computer communication systems.

   Electrical engineering.

   Systems and Data Security.

   Computer Communication Networks.

   Communications Engineering, Networks.

Анотація: This SpringerBrief explores features of digital protocol wireless communications systems, and features of the emerging electrical smart grid. Both low power and high power wireless systems are described. The work also examines the cybersecurity vulnerabilities, threats and current levels of risks to critical infrastructures that rely on digital wireless technologies. Specific topics include areas of application for high criticality wireless networks (HCWN), modeling risks and vulnerabilities, governance and management frameworks, systemic mitigation, reliable operation, assessing effectiveness and efficiency, resilience testing, and accountability of HCWN. Designed for researchers and professionals, this SpringerBrief provides essential information for avoiding malevolent uses of wireless networks. The content is also valuable for advanced-level students interested in security studies or wireless networks.

Перейти: https://doi.org/10.1007/978-3-319-52905-9

Дод.точки доступу:
Abaimov, Stanislav.; Gaycken, Sandro.; Wilson, Clay.; Martellini, Maurizio. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

 1-20    21-40   41-60   61-80   81-100   101-120      
 
© Міжнародна Асоціація користувачів і розробників електронних бібліотек і нових інформаційних технологій
(Асоціація ЕБНІТ)