Головна Спрощенний режим Опис Шлюз Z39.50
Авторизація
Прізвище
Пароль
 

Бази даних


Доступ до повнотекстових книг Springer Nature (через IP-адреси БДМУ) - результати пошуку

Вид пошуку

Зона пошуку
у знайденому
Формат представлення знайдених документів:
повнийінформаційнийкороткий
Відсортувати знайдені документи за:
авторомназвоюроком виданнятипом документа
Пошуковий запит: (<.>S=Cryptology.<.>)
Загальна кiлькiсть документiв : 101
Показанi документи с 1 за 20
 1-20    21-40   41-60   61-80   81-101   101-101 
1.


   
    Applications and Techniques in Information Security [[electronic resource] :] : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings / / ed. Batten, Lynn. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 223 p. 68 illus. - Б. ц.
    Зміст:
Keynote Speeches --
Crypto Algorithms and Applications --
Attacks --
Malware and Malicious Events Detection --
System and Network Security.
Рубрики: Computer security.
   Data encryption (Computer science).

   Algorithms.

   Systems and Data Security.

   Cryptology.

   Algorithm Analysis and Problem Complexity.

Анотація: This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.

Перейти: https://doi.org/10.1007/978-981-10-5421-1

Дод.точки доступу:
Batten, Lynn. \ed.\; Kim, Dong Seong. \ed.\; Zhang, Xuyun. \ed.\; Li, Gang. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

2.


   
    Security and Privacy in Communication Networks [[electronic resource] :] : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings / / ed. Deng, Robert. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 781 p. 256 illus. - Б. ц.
Рубрики: Computer security.
   Data protection.

   Data encryption (Computer science).

   Computer communication systems.

   Computers and civilization.

   Artificial intelligence.

   Systems and Data Security.

   Security.

   Cryptology.

   Computer Communication Networks.

   Computers and Society.

   Artificial Intelligence.

Анотація: This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016. The 32 revised full papers and 18 poster papers were carefully reviewed and selected from 137 submissions. The papers are organized thematically starting with mobile and network security, followed by applied cryptography, web security and privacy, system security, hardware security. The volume also includes papers from the ATCS workshop and the poster session.

Перейти: https://doi.org/10.1007/978-3-319-59608-2

Дод.точки доступу:
Deng, Robert. \ed.\; Weng, Jian. \ed.\; Ren, Kui. \ed.\; Yegneswaran, Vinod. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

3.


    Kizza, Joseph Migga.
    Ethical and Social Issues in the Information Age [[electronic resource] /] : монография / Joseph Migga. Kizza ; . - 6th ed. 2017. - [S. l. : s. n.]. - XXII, 413 p. 22 illus. - Б. ц.
    Зміст:
History of Computing --
Morality and the Law --
Ethics and Ethical Analysis --
Ethics and the Professions --
Anonymity, Security, Privacy, and Civil Liberties --
Intellectual Property Rights and Computer Technology --
Social Context of Computing --
Software Issues: Risks and Liabilities --
Computer Crimes --
New Frontiers for Computer Ethics: Artificial Intelligence --
New Frontiers for Computer Ethics: Virtualization and Virtual Reality --
New Frontiers for Computer Ethics: Cyberspace and Online Social Networks --
Cyberbullying --
New Frontiers for Computer Ethics: Internet of Things (IoT) --
Ethical, Privacy and Security Issues in the Social Network EcoSystems --
Mobile Systems and Intractable Social, Ethical and Security Issues --
Computer Crime Investigations – Computer Forensics --
Biometrics.
Рубрики: Computers and civilization.
   Application software.

   Data encryption (Computer science).

   User interfaces (Computer systems).

   Technology—Sociological aspects.

   Philosophy.

   Computers and Society.

   Information Systems Applications (incl. Internet).

   Cryptology.

   User Interfaces and Human Computer Interaction.

   Science and Technology Studies.

   Philosophy of Technology.

Анотація: This engaging and thought-provoking textbook examines the ethical, social, and policy challenges arising from our rapidly and continuously evolving computing technology, ranging from the Internet to the ubiquitous portable devices we use to access it. The text emphasizes the need for a strong ethical framework for all applications of computer science and engineering in our professional and personal life. This thoroughly revised and updated sixth edition features two new chapters covering online harassment and cyberbullying, and the complex issues introduced by the emergence of the Internet of Things (IoT). Topics and features: Establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativism Offers pertinent discussions on privacy, surveillance, employee monitoring, biometrics, civil liberties, harassment, the digital divide, and discrimination Examines the ethical, cultural and economic realities of mobile telecommunications, computer social network ecosystems, and virtualization technology Reviews issues of property rights, responsibility and accountability relating to information technology and software Explores the evolution of electronic crime, network security, and computer forensics Introduces the new frontiers of ethics: virtual reality, artificial intelligence, and the Internet Discusses the security quagmire of the IoT, and the growing threat of bullying facilitated by electronic technology (NEW) Provides exercises, objectives, and issues for discussion with every chapter This extensive textbook/reference addresses the latest curricula requirements for understanding the cultural, social, legal, and ethical issues in computer science and related fields, and offers invaluable advice for industry professionals wishing to put such principles into practice. Dr. Joseph Migga Kizza is a Professor and Head of the Department of Computer Science and Engineering at the University of Tennessee at Chattanooga, USA.  He is also the author of the successful Springer title Guide to Computer Network Security.

Перейти: https://doi.org/10.1007/978-3-319-70712-9

Дод.точки доступу:
Kizza, Joseph Migga. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

4.


   
    Trusted Computing and Information Security [[electronic resource] :] : 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings / / ed. Xu, Ming. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 410 p. 133 illus. - Б. ц.
    Зміст:
Theory of trusted computing, trustworthy software --
Infrastructure of trusted computing, application and evaluation of trusted computing --
Network security and communication security --
Theory and technology of cryptographic techniques --
Information content security --
System security for mobile network and IoT systems, industrial control and embedded systems --
Security for Cloud computing, virtualization systems and big data.
Рубрики: Computer security.
   Data encryption (Computer science).

   Data protection.

   Computer software—Reusability.

   Systems and Data Security.

   Cryptology.

   Security.

   Performance and Reliability.

Анотація: This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.

Перейти: https://doi.org/10.1007/978-981-10-7080-8

Дод.точки доступу:
Xu, Ming. \ed.\; Qin, Zheng. \ed.\; Yan, Fei. \ed.\; Fu, Shaojing. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

5.


   
    ICT Systems Security and Privacy Protection [[electronic resource] :] : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings / / ed.: De Capitani di Vimercati, Sabrina., Martinelli, Fabio. - 1st ed. 2017. - [S. l. : s. n.]. - XVI, 586 p. 159 illus. - Б. ц.
Рубрики: Computer security.
   Data encryption (Computer science).

   Application software.

   Computers and civilization.

   Computers.

   Law and legislation.

   Systems and Data Security.

   Cryptology.

   Information Systems Applications (incl. Internet).

   Computers and Society.

   Legal Aspects of Computing.

   Computer Applications.

Анотація: This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.

Перейти: https://doi.org/10.1007/978-3-319-58469-0

Дод.точки доступу:
De Capitani di Vimercati, Sabrina. \ed.\; Martinelli, Fabio. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

6.


    Nachef, Valerie.
    Feistel Ciphers [[electronic resource] :] : security Proofs and Cryptanalysis / / Valerie. Nachef, Patarin, Jacques., Volte, Emmanuel. ; . - 1st ed. 2017. - [S. l. : s. n.]. - XV, 309 p. 39 illus., 6 illus. in color. - Б. ц.
    Зміст:
Part 1 Definitions and first security results --
Chapter 1 Classical Feistel ciphers, first properties --
Chapter 2 Generalized Feistel ciphers, first properties --
Chapter 3 Luby-Rackoff Theorems --
Chapter 4 The coefficient H method --
Part 2 Generic Attacks --
Chapter 5 Introduction to cryptanalysis --
Chapter 6 Classical Feistel ciphers --
Chapter 7 Contracting Feistel ciphers --
Chapter 8 Expanding Feistel ciphers --
Chapter 9 Generalized Feistel ciphers --
Chapter 10 Classical Feistel ciphers with internal permutations --
Part 3: DES and other specific Feistel ciphers --
Chapter 11 DES (Definition, differential and linear cryptanalysis of DES) --
Chapter 12 3DES with 2 keys --
Chapter 13: XDES, 3DES with 3 keys --
Chapter 14 Bear-Lion, Cast, RC6, MARS, Coconut, Simon, Lucifer --
Part 4 Improved security results --
Chapter 15 Proofs beyond the birthday bound with the coupling method --
Chapter 16 Proofs beyond the birthday bound with the coefficient H method --
Chapter 17 Proofs based on games --
Chapter 18 Indifferentiability.
Рубрики: Data encryption (Computer science).
   Mathematical statistics.

   Computer science—Mathematics.

   Computer mathematics.

   Cryptology.

   Probability and Statistics in Computer Science.

   Mathematical Applications in Computer Science.

Анотація: This book provides a comprehensive survey of different kinds of Feistel ciphers, including their definition and mathematical/computational properties. Feistel Networks form the base design of the Data Encryption Standard algorithm, a former US NIST standard block cipher, originally released in 1977, and the framework used by several other symmetric ciphers ever since. The results consolidated in this volume provide an overview of this important cipher design to researchers and practitioners willing to understand the design and security analysis of Feistel ciphers.

Перейти: https://doi.org/10.1007/978-3-319-49530-9

Дод.точки доступу:
Patarin, Jacques.; Volte, Emmanuel.; Nachef, Valerie. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

7.


   
    Secure and Trustworthy Transportation Cyber-Physical Systems [[electronic resource] /] : монография / ed.: Sun, Yunchuan., Song, Houbing. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 159 p. 41 illus., 35 illus. in color. - Б. ц.
    Зміст:
Chapter 1 Secure and Trustworthy Transportation Cyber-Physical System by Yunchuan Sun, Lei Wu from Beijing Normal University --
Chapter 2 Smart Transportation Systems: Architecture, Enabling Technologies, and Open Issues by Wei Yu et. al. from Towson University, USA --
Chapter 3 Properties, Principles & Metrics in Transportation CPS by Syed Hassan Ahmed from Kyungpook National University, South Korea --
Chapter 4 Privacy relevant issues for Transportation CPS by Zhipeng Cai from Georgia State University, USA --
Chapter 5 Trust Management in Transportation CPS by Wenjia Li, et. al. from New York Institute of Technology, USA --
Chapter 6 Secure Data Dissemination for Intelligent Transportation Systems by Li Sun and Qinghe Du,from Xi'an Jiaotong University --
Chapter 7 Tools & Practices by Xuerong Cui.
Рубрики: Computer security.
   Computer communication systems.

   Electrical engineering.

   Data encryption (Computer science).

   Quality control.

   Reliability.

   Industrial safety.

   Systems and Data Security.

   Computer Communication Networks.

   Communications Engineering, Networks.

   Cryptology.

   Quality Control, Reliability, Safety and Risk.

Анотація: This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It examines theories and various state-of-the-art technologies and methodologies. Starting with a survey of the latest solutions in TCPSs, it introduces a smart-transport-system architecture design based on cyber-physical systems. It then discusses in detail the principles and metrics of evaluating safety and privacy in TCPSs and elaborates the verification and analysis of secure, robust and trustworthy TCPSs. Moreover, it demonstrates the advanced and novel tools commonly used in practice by several researchers. Lastly it provides an exhaustive case study on the authentication and attestation in TCPSs. This book is of interest not only to readers in the field of TCPSs, but also to those in interdisciplinary fields, such as energy, healthcare, bio-engineering etc.

Перейти: https://doi.org/10.1007/978-981-10-3892-1

Дод.точки доступу:
Sun, Yunchuan. \ed.\; Song, Houbing. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

8.


    Kumar, Santosh.
    Animal Biometrics [[electronic resource] :] : techniques and Applications / / Santosh. Kumar, Singh, Sanjay Kumar., Singh, Rishav., Singh, Amit Kumar. ; . - 1st ed. 2017. - [S. l. : s. n.]. - XXVIII, 243 p. 90 illus., 77 illus. in color. - Б. ц.
    Зміст:
Chapter 1. Introduction --
Chapter 2. Animal Biometric System --
Chapter 3. Animal Biometrics based Approaches --
Chapter 4. Classical Animal Recognition Methodology and Frameworks --
Chapter 5. Animal Biometrics based Recognition Systems (Based on Current State of the Art Approaches) --
Chapter 6. Representation and Identification of Species: Computer Vision and Pattern Recognition Models --
Chapter 7. Emerging Trends and Future Challenges.                    .
Рубрики: Pattern recognition.
   Optical data processing.

   Data encryption (Computer science).

   Biometrics (Biology).

   Pattern Recognition.

   Image Processing and Computer Vision.

   Cryptology.

   Biometrics.

Анотація: This book presents state-of-the-art methodologies and a comprehensive introduction to the recognition and representation of species and individual animals based on their physiological and phenotypic appearances, biometric characteristics, and morphological image patterns. It provides in-depth coverage of this emerging area, with an emphasis on the design and analysis techniques used in visual animal biometrics-based recognition systems. The book offers a comprehensive introduction to visual animal biometrics, addressing a range of recent advances and practices like sensing, feature extraction, feature selection and representation, matching, indexing of feature sets, and animal biometrics-based multimodal systems. It provides authoritative information on all the major concepts, as well as highly specific topics, e.g. the identification of cattle based on their muzzle point image pattern and face images to prevent false insurance claims, or the monitoring and registration of animals based on their biometric features. As such, the book provides a sound platform for understanding the Visual Animal Biometrics paradigm, a vital catalyst for researchers in the field, and a valuable guide for professionals. In addition, it can help both private and public organizations adapt and enhance their classical animal recognition systems.

Перейти: https://doi.org/10.1007/978-981-10-7956-6

Дод.точки доступу:
Singh, Sanjay Kumar.; Singh, Rishav.; Singh, Amit Kumar.; Kumar, Santosh. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

9.


   
    Information Systems Security and Privacy [[electronic resource] :] : second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers / / ed.: Camp, Olivier., Furnell, Steven., Mori, Paolo. - 1st ed. 2017. - [S. l. : s. n.]. - XII, 215 p. 100 illus. - Б. ц.
    Зміст:
Data and software security --
Privacy and confidentiality --
Mobile systems security --
Biometric authentication --
Privacy in social media.
Рубрики: Computer security.
   Data protection.

   Data encryption (Computer science).

   Application software.

   Management information systems.

   Computer science.

   Systems and Data Security.

   Security.

   Cryptology.

   Information Systems Applications (incl. Internet).

   Management of Computing and Information Systems.

Анотація: This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, held in Rome, Italy, in February 2016. The 9 full papers presented together with two invited papers were carefully reviewed and selected from a total of 91 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; privacy in social media.

Перейти: https://doi.org/10.1007/978-3-319-54433-5

Дод.точки доступу:
Camp, Olivier. \ed.\; Furnell, Steven. \ed.\; Mori, Paolo. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

10.


   
    Guide to Security in SDN and NFV [[electronic resource] :] : challenges, Opportunities, and Applications / / ed. Zhu, Shao Ying. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XXII, 331 p. 78 illus. - Б. ц.
    Зміст:
Part I: Introduction to Security in SDNFV – Key Concepts --
Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing Technologies --
NFV Security: Emerging Technologies and Standards --
SDN and NFV Security: Challenges for Integrated Solutions --
Trust in SDN/NFV Environments --
Part II: SDNFV Security Challenges and Network Security Solutions --
Practical Experience in NFV Security Field: Virtual Home Gateway --
A Security Policy Transition Framework for Software-Defined Networks --
SDNFV-Based DDoS Detection and Remediation in Multi-Tenant, Virtualized Infrastructures --
SHIELD – Securing Against Intruders and Other Threats Through a NFV-Enabled Environment --
Part III: Security Implications of SDNFV in Future Networks --
Addressing Industry 4.0 Security by Software-Defined Networking --
Security Requirements for Multi-Operator Virtualized Network and Service Orchestration for 5G --
Improving Security in Coalition Tactical Environments Using an SDN Approach --
A SDN and NFV Use-Case: NDN Implementation and Security Monitoring.
Рубрики: Computer communication systems.
   Computer security.

   Data encryption (Computer science).

   Computer Communication Networks.

   Systems and Data Security.

   Cryptology.

Анотація: This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks. Topics and features: Introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security Discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation Reviews a range of specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN Describes the implementation of a virtual home gateway, and a project that combines dynamic security monitoring with big-data analytics to detect network-wide threats Examines the security implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G Investigates security in the Observe, Orient, Decide and Act (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture Includes review questions in each chapter, to test the reader’s understanding of each of the key concepts described This informative and practical volume is an essential resource for researchers interested in the potential of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems. Dr. Shao Ying Zhu is a Senior Lecturer in Computing at the University of Derby, UK. Dr. Sandra Scott-Hayward is a Lecturer (Assistant Professor) at Queen’s University Belfast, Northern Ireland. Dr. Ludovic Jacquin is a Senior Researcher at Hewlett Packard Labs - the research organisation of Hewlett Packard Enterprise - in Bristol, UK. Prof. Richard Hill is the Head of the Department of Informatics and the Director of the Centre for Industrial Analytics at the University of Huddersfield, UK. The other publications of the editors include the Springer titles Guide to Security Assurance for Cloud Computing and Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications.

Перейти: https://doi.org/10.1007/978-3-319-64653-4

Дод.точки доступу:
Zhu, Shao Ying. \ed.\; Scott-Hayward, Sandra. \ed.\; Jacquin, Ludovic. \ed.\; Hill, Richard. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

11.


    Wang, Lingyu.
    Network Security Metrics [[electronic resource] /] : монография / Lingyu. Wang, Jajodia, Sushil., Singhal, Anoop. ; . - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 207 p. 110 illus., 63 illus. in color. - Б. ц.
    Зміст:
1 Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks --
2 Refining CVSS-based network security metrics by examining the base scores --
3 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs --
4 k-Zero day safety: Evaluating the resilience of networks against unknown attacks --
5 Using Bayesian Networks to Fuse Intrusion Evidences and Detect Zero-day Attack Paths --
6 Evaluating the network diversity of networks against zero-day attacks --
7 Metrics suite for network attack graph analytics --
8 A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center.
Рубрики: Computer security.
   Computer communication systems.

   Data encryption (Computer science).

   Systems and Data Security.

   Computer Communication Networks.

   Cryptology.

Анотація: This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since “you cannot improve what you cannot measure”, a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.

Перейти: https://doi.org/10.1007/978-3-319-66505-4

Дод.точки доступу:
Jajodia, Sushil.; Singhal, Anoop.; Wang, Lingyu. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

12.


    Kavrestad, Joakim.
    Guide to Digital Forensics [[electronic resource] :] : a Concise and Practical Introduction / / Joakim. Kavrestad ; . - 1st ed. 2017. - [S. l. : s. n.]. - XII, 147 p. 79 illus. - Б. ц.
    Зміст:
Part I: Theory --
What is Digital Forensics? --
What is Cybercrime? --
Computer Theory --
Collecting Evidence --
Analyzing Data and Writing Reports --
Part II: Putting it into Practice --
Collecting Data --
Indexing, Searching and Cracking --
Finding Artifacts --
Some Common Questions --
FTK Specifics --
Basic Memory Analysis --
Part III: Vocabulary --
Vocabulary --
Part IV: Appendices --
Appendix A: Solutions --
Appendix B: Useful Scripts --
Appendix C: Sample Report Template --
Appendix D: List of Time Zones --
Appendix E: Complete Jitsi Chat Log.
Рубрики: Computer security.
   Optical data processing.

   Data encryption (Computer science).

   Public safety.

   Systems and Data Security.

   Image Processing and Computer Vision.

   Cryptology.

   Crime Control and Security.

Анотація: This work introduces the reader to the world of digital forensics in a practical and accessible manner. The text was written to fulfill a need for a book that introduces forensic methodology and sound forensic thinking, combined with hands-on examples for common tasks in a computer forensic examination. The author has several years of experience as a computer forensics examiner and is now working as a university-level lecturer. Guide to Digital Forensics: A Concise and Practical Introduction is intended for students that are looking for an introduction to computer forensics and can also be used as a collection of instructions for practitioners. The aim is to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a fo rensic examination in law enforcement and in the private sector. Upon reading this book, the reader should have a proper overview of the field of digital forensics, starting them on the journey of becoming a computer forensics expert.

Перейти: https://doi.org/10.1007/978-3-319-67450-6

Дод.точки доступу:
Kavrestad, Joakim. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

13.


   
    Advances in Digital Forensics XIII [[electronic resource] :] : 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers / / ed.: Peterson, Gilbert., Shenoi, Sujeet. - 1st ed. 2017. - [S. l. : s. n.]. - XVIII, 303 p. 98 illus. - Б. ц.
Рубрики: Computer security.
   Data protection.

   Application software.

   Computers and civilization.

   Data encryption (Computer science).

   Systems and Data Security.

   Security.

   Computer Appl. in Administrative Data Processing.

   Computers and Society.

   Cryptology.

Анотація: Advances in Digital Forensics XIII Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.  Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations.  Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics XIII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major techn ical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues; Mobile and Embedded Device Forensics; Network and Cloud Forensics; Threat Detection and Mitigation; Malware Forensics; Image Forensics; and Forensic Techniques. This book is the thirteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics.  The book contains a selection of sixteen edited papers from the Thirteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2017. Advances in Digital Forensics XIII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson, Chair, IFIP WG 11.9 on Digital Forensics, is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.

Перейти: https://doi.org/10.1007/978-3-319-67208-3

Дод.точки доступу:
Peterson, Gilbert. \ed.\; Shenoi, Sujeet. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

14.


   
    Data Analytics and Decision Support for Cybersecurity [[electronic resource] :] : trends, Methodologies and Applications / / ed.: Palomares Carrascosa, Ivan., Kalutarage, Harsha Kumara., Huang, Yan. - 1st ed. 2017. - [S. l. : s. n.]. - XVI, 270 p. 105 illus., 74 illus. in color. - Б. ц.
    Зміст:
A Toolset for Intrusion and Insider Threat Detection --
Human-Machine Decision Support Systems for Insider Threat Detection --
Detecting malicious collusions between mobile software applications --
Dynamic Analysis of Malware using Run-Time Opcodes --
Big Data Analytics for Intrusion Detection System: Statistical Decision-making using Finite Dirichlet Mixture Models --
Security of Online Examinations --
Attribute Noise, Classification Technique, and Classification Accuracy --
Learning from Loads: An Intelligent System for Decision Support in Identifying Nodal Load Disturbances of Cyber-Attacks in Smart Power Systems using Gaussian Processes and Fuzzy Inference --
Visualization and Data Provenance Trends in Decision Support for Cybersecurity.
Рубрики: Data mining.
   Data encryption (Computer science).

   Big data.

   Data Mining and Knowledge Discovery.

   Cryptology.

   Big Data/Analytics.

Анотація: The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data science methods, has resulted in a higher demand for effective data-driven models that support decision-making at a strategic level. This motivates the need for defining novel data analytics and decision support approaches in a myriad of real-life scenarios and problems, with Cybersecurity-related domains being no exception. This contributed volume comprises nine chapters, written by leading international researchers, covering a compilation of recent advances in Cybersecurity-related applications of data analytics and decision support approaches. In addition to theoretical studies and overviews of existing relevant literature, this book comprises a selection of application-oriented research contributions. The investigations undertaken across these chapters focus on diverse and critical Cybersecurity problems, such as Intrusion Detection, Insider Threats, Insider Threats, Collusion Detection, Run-Time Malware Detection, Intrusion Detection, E-Learning, Online Examinations, Cybersecurity noisy data removal, Secure Smart Power Systems, Security Visualization and Monitoring. Researchers and professionals alike will find the chapters an essential read for further research on the topic.

Перейти: https://doi.org/10.1007/978-3-319-59439-2

Дод.точки доступу:
Palomares Carrascosa, Ivan. \ed.\; Kalutarage, Harsha Kumara. \ed.\; Huang, Yan. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

15.


   
    Advances in Cryptology – CRYPTO 2017 [[electronic resource] :] : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part I / / ed.: Katz, Jonathan., Shacham, Hovav. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 793 p. 120 illus. - Б. ц.
Рубрики: Data encryption (Computer science).
   Computer security.

   Computer communication systems.

   Computers and civilization.

   Management information systems.

   Computer science.

   Computers.

   Law and legislation.

   Cryptology.

   Systems and Data Security.

   Computer Communication Networks.

   Computers and Society.

   Management of Computing and Information Systems.

   Legal Aspects of Computing.

Анотація: The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Перейти: https://doi.org/10.1007/978-3-319-63688-7

Дод.точки доступу:
Katz, Jonathan. \ed.\; Shacham, Hovav. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

16.


   
    Cloud Computing and Security [[electronic resource] :] : third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II / / ed. Sun, Xingming. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XXII, 879 p. 281 illus. - Б. ц.
    Зміст:
Information hiding --
Cloud computing.- IOT applications --
Information security --
Multimedia applications.-Optimization  and classification.
Рубрики: Application software.
   Computer communication systems.

   Algorithms.

   Management information systems.

   Computer science.

   Data encryption (Computer science).

   Computers and civilization.

   Information Systems Applications (incl. Internet).

   Computer Communication Networks.

   Algorithm Analysis and Problem Complexity.

   Management of Computing and Information Systems.

   Cryptology.

   Computers and Society.

Анотація: This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017. The 116 full papers and 11 short papers of these volumes were carefully  reviewed and selected from 391 submissions. The papers are organized in  topical sections such as: information hiding; cloud computing;  IOT applications; information security; multimedia applications; optimization  and classification.

Перейти: https://doi.org/10.1007/978-3-319-68542-7

Дод.точки доступу:
Sun, Xingming. \ed.\; Chao, Han-Chieh. \ed.\; You, Xingang. \ed.\; Bertino, Elisa. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

17.


   
    Smart Computing and Communication [[electronic resource] :] : first International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedings / / ed. Qiu, Meikang. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 589 p. 233 illus. - Б. ц.
    Зміст:
Cost Reduction for Data Allocation in Heterogenous Cloud Computing Using Dynamic Programming --
Minimizing Bank Conict Delay for Real-Time Embedded Multicore systems via Bank Mapping --
A Hybrid Algorithm Based on Particle Swarm Optimization and Ant Colony Optimization Algorithm --
Cloud Computing and Pumping Unit Evaluation --
Big Data and Mechanical Drawing Teaching Online --
Energy Saving Method for On-chip Data Bus Based on Bit Switching Activity Perception with Multi-Encoding --
A Novel PSO based Task Scheduling Algorithm for Multi-core Systems --
Artificial bee colony algorithm with hierarchical groups for global numerical optimization --
An Buffering Optimization Algorithm for Cooperative Mobile Service --
Bignetwork: SDN Protocol Analysis with Process Algebra Method --
Bignetwork: Unsupervised pre-training Classifier Based on Restricted Boltzmann Machine with Imbalanced Data --
A secure homomorphic encryption algorithm over integers for data privacy protection in clouds --
Big Data Management the Mass Weather Logs. - Application Of A Parallel FSM Parsing Algorithm For Web Engines --
PTrack:A RFID-based Tracking Algorithm for Indoor Randomly Moving Targets --
Predicting the Change of Stock Market Index based on Social Media Analysis --
Human activity recognition based on smart phone's 3-axis acceleration sensor --
Bug analysis of Android applications based on JPF --
A Genetic-Ant-Colony Hybrid Algorithm for Task Scheduling in Cloud System --
A Hybrid Algorithm of Extreme Learning Machine and Sparse Auto-encoder --
Bank card and ID card number recognition in Android financial APP --
Mining association rules from a dynamic probabilistic numerical dataset using estimated-frequent uncertain-itemsets --
Optimized Strategy of MFCC for Multi-sensor Sign Language Recognition --
Security and Privacy Issues: A Survey on FinTech --
Multi-sensor system calibration approach based on forward-model and inverse-model --
A Virtual Communication Strategy for Smart Photovoltaic Generation Systems --
Hybrid One-Class Collaborative Filtering for Job Recommendation --
Learning Quality Evaluation of MOOC Based on Big Data Analysis --
QoS-driven Frequency Scaling for Energy Efficiency and Reliability of Static Web Servers in Software-defined Data Centers --
Making Cloud Storage Integrity Checking Protocols Economically Smarter --
E3: Efficient Error Estimation for Fingerprint-based Indoor Localization System --
Attribute-based and keywords vector searchable public key encryption --
PADS:A Reliable Pothole Detection System Using Machine Learning --
A Quantitative Approach for Memory Fragmentation in Mobile Systems --
A DDoS Detection and Mitiation System Framework based on Spark and SDN --
Based on Cloud-based GIS in the Wisdom Yellow River emergency system design and research --
Based on the MapX contour mapping algorithm --
The Function of GIS in the Smart City Construction --
A Novel PSO-DE Co-evolutionary Algorithm Based on Decomposition Framework --
Rhythm Authentication Using Multi-Touch Technology: A New Method of Biometric Authentication --
An Improved Ciphertext-Policy Attribute-Based Encryption Scheme --
An information-centric architecture for server clustering towards 3D data-intensive applications --
Efficient Computation for the longest common subsequence with substring inclusion and subsequence exclusion constraints --
An Optimal Algorithm for a Computer Game in Linear Time --
AUDITOR: A Stage-wise Soft-Error Detection Scheme for Flip-op Based Pipelines --
Aggregating Heterogeneous Services in the Smart City: The Practice in China --
Improving Reliability of Cache with Hybrid Memory Hierarchy by STT-RAM --
SOA Reference Architecture: Standards and Analysis --
An Evolutionary Approach for Short-Term Traffic Flow Forecasting Service in Intelligent Transportation System --
The production Investigation of DOM Based on full digital photogrammetric system VirtuoZo --
A Congestion Avoidance Algorithm based on Fuzzy Controlling --
An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-based Encryption Scheme --
Understanding Networking Capacity Management in Cloud Computing --
A PSO-Based Virtual Network Mapping Algorithm with Crossover Operator --
WiHumidity: A Novel CSI-Based Humidity Measurement System. – Bike-Sharing System: a Big-Data Perspective. - Process mining of event log from web information and administration system for management of student's computer networks. - A Virtual Network Embedding Algorithm based on Hybrid Particle Swarm Optimization --
Research on Content Distribution of P2P VoD with Cloud Assisting.
Рубрики: Computer communication systems.
   Data encryption (Computer science).

   Application software.

   Computers.

   Algorithms.

   Electrical engineering.

   Computer Communication Networks.

   Cryptology.

   Information Systems Applications (incl. Internet).

   Computation by Abstract Devices.

   Algorithm Analysis and Problem Complexity.

   Communications Engineering, Networks.

Анотація: This book constitutes the proceedings of the First International Conference on Smart Computing and Communication, SmartCom 2016, held in Shenzhen, China, in December 2016. The 59 papers presented in this volume were carefully reviewed and selected from 210 submissions. The conference focuses on both smart computing and communications fields and aims to collect recent academic work to improve the research and practical applications.

Перейти: https://doi.org/10.1007/978-3-319-52015-5

Дод.точки доступу:
Qiu, Meikang. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

18.


   
    Service-Oriented and Cloud Computing [[electronic resource] :] : 6th IFIP WG 2.14 European Conference, ESOCC 2017, Oslo, Norway, September 27-29, 2017, Proceedings / / ed.: De Paoli, Flavio., Schulte, Stefan., Broch Johnsen, Einar. - 1st ed. 2017. - [S. l. : s. n.]. - XII, 239 p. 91 illus. - Б. ц.
    Зміст:
On or Off the Blockchain? Insights on Off-Chaining Computation and Data --
Microservices and Containers --
Microservices Identification through Interface Analysis --
A Performance Survey of Lightweight Virtualization Techniques --
Low-level Exploitation Mitigation by Diverse Microservices --
Security --
A Formal Approach for the Verification of AWS IAM Access Control Policies --
Foundations for Designing, Defining, Validating and Executing Access Control Policies in Cloud Environments --
Secure and Scalable Remote Access Tunnels for the IIoT: An Assessment of openVPN and IPSec Performance --
Cloud Resources --
Two are better than one: An algorithm portfolio approach to cloud resource management --
A Fuzzy Load Balancer for Adaptive Fault Tolerance Management in Cloud Platforms --
Data preparation as a service based on Apache Spark --
Services --
Human-in-the-Loop Simulation of Cloud Services --
Toward automatic semantic API descriptions to support services composition --
On Abstraction-based Deadlock-Analysis in Service-Oriented Systems with Recursion --
Internet of Things and Data Streams --
IoT-based Compliance Checking of Multi-party Business Processes modeled with Commitments --
Empowering Low-latency Applications through a Serverless Edge Computing Architecture --
Industrial Applications of Service and Cloud Computing --
uStorage – A storage architecture to provide Block-level Storage through Object-based Storage --
Heart Order Detection with Menard Algorithm on Apache Spark.
Рубрики: Software engineering.
   Application software.

   Computer security.

   Data encryption (Computer science).

   Information technology.

   Business—Data processing.

   Software Engineering.

   Information Systems Applications (incl. Internet).

   Systems and Data Security.

   Cryptology.

   IT in Business.

Анотація: This book constitutes the refereed proceedings of the 6th IFIP WG 2.14 European Conference on Service-Oriented and Cloud Computing, ESOCC 2017, held in Oslo, Norway, in September 2017.  The 6 short and 10 full papers presented in this volume were carefully reviewed and selected from 37 submissions. The volume also contains one invited talk in full paper length. The contributions were organized in topical sections named: microservices and containers; security; cloud resources; services; internet of things and data streams; and industrial applications of service and cloud computing. .

Перейти: https://doi.org/10.1007/978-3-319-67262-5

Дод.точки доступу:
De Paoli, Flavio. \ed.\; Schulte, Stefan. \ed.\; Broch Johnsen, Einar. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

19.


   
    Information Security and Cryptology – ICISC 2016 [[electronic resource] :] : 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers / / ed.: Hong, Seokhie., Park, Jong Hwan. - 1st ed. 2017. - [S. l. : s. n.]. - XVI, 351 p. 31 illus. - Б. ц.
    Зміст:
Protocols --
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA --
Lattice Cryptography --
Practical post-quantum public key cryptosystem based on LWE --
Analysis of Error Terms of Signatures Based on Learning with Errors --
Encryption --
Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups --
Lossy Key Encapsulation Mechanism and Its Applications --
Expanded Framework for Dual System Encryption and its Application --
Adaptively Secure Broadcast Encryption with Dealership --
Implementation and Algorithms --
A new algorithm for residue multiplication modulo $2
Рубрики: Computer security.
   Data protection.

   Data encryption (Computer science).

   Management information systems.

   Computer science.

   Systems and Data Security.

   Security.

   Cryptology.

   Management of Computing and Information Systems.

Анотація: This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis. .

Перейти: https://doi.org/10.1007/978-3-319-53177-9

Дод.точки доступу:
Hong, Seokhie. \ed.\; Park, Jong Hwan. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

20.


   
    Security Protocols XXIV [[electronic resource] :] : 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers / / ed. Anderson, Jonathan. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - X, 233 p. 23 illus. - Б. ц.
    Зміст:
Evolving Security --
Considering that security protocols evolve --
Changing requirements --
Changing mechanisms --
Attackers' changing agendas and capabilities.
Рубрики: Computer security.
   Data encryption (Computer science).

   Computer communication systems.

   Management information systems.

   Computer science.

   Systems and Data Security.

   Cryptology.

   Computer Communication Networks.

   Management of Computing and Information Systems.

Анотація: This book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016. The 13 thoroughly revised papers presented together with the respective transcripts of discussions have been carefully reviewed. The theme of the workshop was Evolving Security - considering that security protocols evolve with their changing requirements, their changing mechanisms and attackers' changing agendas and capabilities.

Перейти: https://doi.org/10.1007/978-3-319-62033-6

Дод.точки доступу:
Anderson, Jonathan. \ed.\; Matyas, Vashek. \ed.\; Christianson, Bruce. \ed.\; Stajano, Frank. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

 1-20    21-40   41-60   61-80   81-101   101-101 
 
© Міжнародна Асоціація користувачів і розробників електронних бібліотек і нових інформаційних технологій
(Асоціація ЕБНІТ)