Головна Спрощенний режим Опис Шлюз Z39.50
Авторизація
Прізвище
Пароль
 

Бази даних


Доступ до повнотекстових книг Springer Nature (через IP-адреси БДМУ) - результати пошуку

Вид пошуку

Зона пошуку
у знайденому
Формат представлення знайдених документів:
повнийінформаційнийкороткий
Відсортувати знайдені документи за:
авторомназвоюроком виданнятипом документа
Пошуковий запит: (<.>S=Law and legislation.<.>)
Загальна кiлькiсть документiв : 24
Показанi документи с 1 за 20
 1-20    21-24 
1.


   
    Open Source Systems: Towards Robust Practices [[electronic resource] :] : 13th IFIP WG 2.13 International Conference, OSS 2017, Buenos Aires, Argentina, May 22-23, 2017, Proceedings / / ed. Balaguer, Federico. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 220 p. 37 illus. - Б. ц.
Рубрики: Management information systems.
   Computer science.

   Software engineering.

   Computers.

   Law and legislation.

   Application software.

   Management of Computing and Information Systems.

   Software Engineering.

   Legal Aspects of Computing.

   Information Systems Applications (incl. Internet).

Анотація: This book is open access under a CC BY license. This book constitutes the refereed proceedings of the 13th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2017, held in Buenos Aires, Argentina, in May 2017. The 16 revised full papers and 3 short papers presented were carefully reviewed and selected from 32 submissions. The papers cover a wide range of topics related to free, libre, and open source software (FLOSS), including: licensing, strategies, and practices; case studies; projects, communication, and participation; tools; and project management, development and evaluation.

Перейти: https://doi.org/10.1007/978-3-319-57735-7

Дод.точки доступу:
Balaguer, Federico. \ed.\; Di Cosmo, Roberto. \ed.\; Garrido, Alejandra. \ed.\; Kon, Fabio. \ed.\; Robles, Gregorio. \ed.\; Zacchiroli, Stefano. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

2.


   
    Future Network Systems and Security [[electronic resource] :] : third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings / / ed.: Doss, Robin., Piramuthu, Selwyn., Zhou, Wei. - 1st ed. 2017. - [S. l. : s. n.]. - X, 199 p. 60 illus. - Б. ц.
    Зміст:
Protocol design and secure implementation --
Security protocols and attack countermeasures --
Big data and future applications.
Рубрики: Computer communication systems.
   Application software.

   Computers and civilization.

   Data protection.

   Computer system failures.

   Computers.

   Law and legislation.

   Computer Communication Networks.

   Information Systems Applications (incl. Internet).

   Computers and Society.

   Security.

   System Performance and Evaluation.

   Legal Aspects of Computing.

Анотація: This book constitutes the refereed proceedings of the Third International Conference on Future Network Systems and Security, FNSS 2017, held in Gainesville, FL, USA, during August/September 2017. The 15 full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on protocol design and secure implementation, security protocols and attack countermeasures, big data and future applications. .

Перейти: https://doi.org/10.1007/978-3-319-65548-2

Дод.точки доступу:
Doss, Robin. \ed.\; Piramuthu, Selwyn. \ed.\; Zhou, Wei. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

3.


   
    ICT Systems Security and Privacy Protection [[electronic resource] :] : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings / / ed.: De Capitani di Vimercati, Sabrina., Martinelli, Fabio. - 1st ed. 2017. - [S. l. : s. n.]. - XVI, 586 p. 159 illus. - Б. ц.
Рубрики: Computer security.
   Data encryption (Computer science).

   Application software.

   Computers and civilization.

   Computers.

   Law and legislation.

   Systems and Data Security.

   Cryptology.

   Information Systems Applications (incl. Internet).

   Computers and Society.

   Legal Aspects of Computing.

   Computer Applications.

Анотація: This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.

Перейти: https://doi.org/10.1007/978-3-319-58469-0

Дод.точки доступу:
De Capitani di Vimercati, Sabrina. \ed.\; Martinelli, Fabio. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

4.


   
    Engineering Applications of Neural Networks [[electronic resource] :] : 18th International Conference, EANN 2017, Athens, Greece, August 25–27, 2017, Proceedings / / ed. Boracchi, Giacomo. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIX, 737 p. 225 illus. - Б. ц.
    Зміст:
ANN in engineering applications --
Classification pattern recognition --
Deep learning convolutional ANN --
Deep learning image analysis --
Fuzzy - neuro fuzzy --
Learning generalization --
Learning in financial applications --
Medical AI applications --
Optimization data mining --
Recommendation systems --
Robotics and machine vision --
MHDW2017 --
5GPINE2017.
Рубрики: Artificial intelligence.
   Data mining.

   Optical data processing.

   Application software.

   Computational intelligence.

   Computers.

   Law and legislation.

   Artificial Intelligence.

   Data Mining and Knowledge Discovery.

   Computer Imaging, Vision, Pattern Recognition and Graphics.

   Computer Applications.

   Computational Intelligence.

   Legal Aspects of Computing.

Анотація: This book constitutes the refereed proceedings of the 18th International Conference on Engineering Applications of Neural Networks, EANN 2017, held in Athens, Greece, in August 2017. The 40 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 83 submissions. The papers cover the topics of deep learning, convolutional neural networks, image processing, pattern recognition, recommendation systems, machine learning, and applications of Artificial Neural Networks (ANN) applications in engineering, 5G telecommunication networks, and audio signal processing. The volume also includes papers presented at the 6th Mining Humanistic Data Workshop (MHDW 2017) and the 2nd Workshop on 5G-Putting Intelligence to the Network Edge (5G-PINE).

Перейти: https://doi.org/10.1007/978-3-319-65172-9

Дод.точки доступу:
Boracchi, Giacomo. \ed.\; Iliadis, Lazaros. \ed.\; Jayne, Chrisina. \ed.\; Likas, Aristidis. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

5.


    Baumard, Philippe.
    Cybersecurity in France [[electronic resource] /] : монография / Philippe. Baumard ; . - 1st ed. 2017. - [S. l. : s. n.]. - IX, 106 p. 12 illus. - Б. ц.
    Зміст:
Introduction --
A Brief History of Hacking and Cyberdefense --
The Determinants of a National Cyber-strategy --
National Cyberdoctrines: Forthcoming Strategic Shifts --
Conclusion.
Рубрики: Computers.
   Law and legislation.

   Legal Aspects of Computing.

Анотація: This Brief presents the overarching framework in which each nation is developing its own cyber-security policy, and the unique position adopted by France. Modern informational crises have penetrated most societal arenas, from healthcare, politics, economics to the conduct of business and welfare. Witnessing a convergence between information warfare and the use of “fake news”, info-destabilization, cognitive warfare and cyberwar, this book brings a unique perspective on modern cyberwarfare campaigns, escalation and de-escalation of cyber-conflicts. As organizations are more and more dependent on information for the continuity and stability of their operations, they also become more vulnerable to cyber-destabilization, either genuine, or deliberate for the purpose of gaining geopolitical advantage, waging wars, conducting intellectual theft and a wide range of crimes. Subsequently, the regulation of cyberspace has grown into an international effort where public, private and sovereign interests often collide. By analyzing the particular case of France national strategy and capabilities, the authors investigate the difficulty of obtaining a global agreement on the regulation of cyber-warfare. A review of the motives for disagreement between parties suggests that the current regulation framework is not adapted to the current technological change in the cybersecurity domain. This book suggests a paradigm shift in handling and anchoring cyber-regulation into a new realm of behavioral and cognitive sciences, and their application to machine learning and cyber-defense.

Перейти: https://doi.org/10.1007/978-3-319-54308-6

Дод.точки доступу:
Baumard, Philippe. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

6.


   
    Advances in Cryptology – CRYPTO 2017 [[electronic resource] :] : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part I / / ed.: Katz, Jonathan., Shacham, Hovav. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 793 p. 120 illus. - Б. ц.
Рубрики: Data encryption (Computer science).
   Computer security.

   Computer communication systems.

   Computers and civilization.

   Management information systems.

   Computer science.

   Computers.

   Law and legislation.

   Cryptology.

   Systems and Data Security.

   Computer Communication Networks.

   Computers and Society.

   Management of Computing and Information Systems.

   Legal Aspects of Computing.

Анотація: The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Перейти: https://doi.org/10.1007/978-3-319-63688-7

Дод.точки доступу:
Katz, Jonathan. \ed.\; Shacham, Hovav. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

7.


   
    Computer Security – ESORICS 2017 [[electronic resource] :] : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I / / ed.: Foley, Simon N., Gollmann, Dieter., Snekkenes, Einar. - 1st ed. 2017. - [S. l. : s. n.]. - XXI, 485 p. 106 illus. - Б. ц.
    Зміст:
Data protection --
Security protocols --
Systems --
Web and network security --
Privacy --
Threat modeling and detection --
Information flow --
Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
Рубрики: Computer security.
   Data encryption (Computer science).

   Management information systems.

   Computer science.

   Algorithms.

   Computers and civilization.

   Computers.

   Law and legislation.

   Systems and Data Security.

   Cryptology.

   Management of Computing and Information Systems.

   Algorithm Analysis and Problem Complexity.

   Computers and Society.

   Legal Aspects of Computing.

Анотація: The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.

Перейти: https://doi.org/10.1007/978-3-319-66402-6

Дод.точки доступу:
Foley, Simon N. \ed.\; Gollmann, Dieter. \ed.\; Snekkenes, Einar. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

8.


   
    Information Security Practice and Experience [[electronic resource] :] : 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings / / ed.: Liu, Joseph K., Samarati, Pierangela. - 1st ed. 2017. - [S. l. : s. n.]. - XVI, 907 p. 211 illus. - Б. ц.
    Зміст:
Blockchain --
Asymmetric encryption --
Symmetric encryption --
Lattice-based cryptography --
Searchable encryption --
Signature --
Authentication --
Cloud security --
Network security --
Cyber-physical security --
Social network and QR code security --
Software security and trusted computing.-  SocialSec track.
Рубрики: Computer security.
   Computer communication systems.

   Data encryption (Computer science).

   Computers and civilization.

   Computers.

   Law and legislation.

   Systems and Data Security.

   Computer Communication Networks.

   Cryptology.

   Computers and Society.

   Legal Aspects of Computing.

Анотація: This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017. The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track.

Перейти: https://doi.org/10.1007/978-3-319-72359-4

Дод.точки доступу:
Liu, Joseph K. \ed.\; Samarati, Pierangela. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

9.


   
    Intelligence and Security Informatics [[electronic resource] :] : 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings / / ed.: Wang, G. Alan., Chau, Michael., Chen, Hsinchun. - 1st ed. 2017. - [S. l. : s. n.]. - VII, 151 p. 55 illus. - Б. ц.
Рубрики: Computer security.
   Computers and civilization.

   Computers.

   Law and legislation.

   Computer communication systems.

   Application software.

   Artificial intelligence.

   Systems and Data Security.

   Computers and Society.

   Legal Aspects of Computing.

   Computer Communication Networks.

   Information Systems Applications (incl. Internet).

   Artificial Intelligence.

Анотація: This book constitutes the refereed proceedings of the 12th Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2017, held in Jeju Island, South Korea, in May 2017 in conjunction with PAKDD 2017, the 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers and one short paper were carefully reviewed and selected from 13 submissions. The papers cover topics such as information access and security, cybersecurity and infrastructure protection, data and text mining, and network based data analytics.

Перейти: https://doi.org/10.1007/978-3-319-57463-9

Дод.точки доступу:
Wang, G. Alan. \ed.\; Chau, Michael. \ed.\; Chen, Hsinchun. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

10.


   
    Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] :] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / ed.: Polychronakis, Michalis., Meier, Michael. - 1st ed. 2017. - [S. l. : s. n.]. - X, 412 p. 114 illus. - Б. ц.
    Зміст:
Enclaves and isolation --
Malware analysis --
Cyber-physical systems --
Detection and protection.-Code analysis --
Web security.
Рубрики: Computer security.
   Operating systems (Computers).

   Computers.

   Law and legislation.

   Computers and civilization.

   Application software.

   Data encryption (Computer science).

   Systems and Data Security.

   Operating Systems.

   Legal Aspects of Computing.

   Computers and Society.

   Information Systems Applications (incl. Internet).

   Cryptology.

Анотація: This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.

Перейти: https://doi.org/10.1007/978-3-319-60876-1

Дод.точки доступу:
Polychronakis, Michalis. \ed.\; Meier, Michael. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

11.


   
    Theory of Cryptography [[electronic resource] :] : 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I / / ed.: Kalai, Yael., Reyzin, Leonid. - 1st ed. 2017. - [S. l. : s. n.]. - XVII, 812 p. 80 illus. - Б. ц.
Рубрики: Data encryption (Computer science).
   Computer security.

   Computers.

   Law and legislation.

   Computers and civilization.

   Computer communication systems.

   Application software.

   Cryptology.

   Systems and Data Security.

   Legal Aspects of Computing.

   Computers and Society.

   Computer Communication Networks.

   Information Systems Applications (incl. Internet).

Анотація: The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Перейти: https://doi.org/10.1007/978-3-319-70500-2

Дод.точки доступу:
Kalai, Yael. \ed.\; Reyzin, Leonid. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

12.


   
    Critical Information Infrastructures Security [[electronic resource] :] : 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers / / ed. Havarneanu, Grigore. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 348 p. 103 illus. - Б. ц.
Рубрики: Computer security.
   Computer communication systems.

   Architecture, Computer.

   Computers and civilization.

   Computers.

   Law and legislation.

   Microprogramming .

   Systems and Data Security.

   Computer Communication Networks.

   Computer System Implementation.

   Computers and Society.

   Legal Aspects of Computing.

   Control Structures and Microprogramming.

Анотація: This book constitutes the post-conference proceedings of the 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, held in Paris, France, in October 2016. The 22 full papers and 8 short papers presented were carefully reviewed and selected from 58 submissions. They present the most recent innovations, trends, results, experiences and concerns in selected perspectives of critical information infrastructure protection covering the range from small-scale cyber-physical systems security via information infrastructures and their interaction with national and international infrastructures.

Перейти: https://doi.org/10.1007/978-3-319-71368-7

Дод.точки доступу:
Havarneanu, Grigore. \ed.\; Setola, Roberto. \ed.\; Nassopoulos, Hypatia. \ed.\; Wolthusen, Stephen. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

13.


   
    Financial Cryptography and Data Security [[electronic resource] :] : 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers / / ed. Kiayias, Aggelos. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 650 p. 132 illus. - Б. ц.
    Зміст:
Privacy and Identity Management --
Privacy and Data Processing --
Cryptographic Primitives and API's.-Vulnerabilities and Exploits --
Blockchain Technology --
Security of Internet Protocols --
Blind signatures.-Searching and Processing Private Data --
Secure Channel Protocols --
Privacy in Data Storage and Retrieval.
Рубрики: Data encryption (Computer science).
   Computers.

   Law and legislation.

   Computers and civilization.

   Software engineering.

   Cryptology.

   Legal Aspects of Computing.

   Computers and Society.

   Software Engineering/Programming and Operating Systems.

   Information Systems and Communication Service.

Анотація: This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017. The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.

Перейти: https://doi.org/10.1007/978-3-319-70972-7

Дод.точки доступу:
Kiayias, Aggelos. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

14.


   
    Security Protocols XXV [[electronic resource] :] : 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers / / ed. Stajano, Frank. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 307 p. 19 illus. - Б. ц.
    Зміст:
Multiple Objectives of Lawful-Surveillance Protocols --
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System --
Assuring the Safety of Asymmetric Social Protocols --
Simulating Perceptions of Security --
Self-Attestation of Things --
Making Decryption Accountable --
Extending Full Disk Encryption for the Future --
Key Exchange with the Help of a Public Ledger --
Reconciling Multiple Objectives – Politics or Markets? --
The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations --
A Security Perspective on Publication Metrics --
Controlling Your Neighbors Bandwidth for Fun and Profit --
Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come --
Security from Disjoint Paths: Is It Possible? --
End to End Security Is Not Enough --
Auditable PAKEs: Approaching Fair Exchange Without a TTP.
Рубрики: Computer security.
   Data encryption (Computer science).

   Computers.

   Law and legislation.

   Computers and civilization.

   Application software.

   Systems and Data Security.

   Cryptology.

   Legal Aspects of Computing.

   Computers and Society.

   Information Systems Applications (incl. Internet).

Анотація: This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017. The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions.  The theme of this year's workshop was multi-objective security and the topics covered included security and privacy, formal methods and theory of security, systems security, network security, software and application security, human and societal aspects of security and privacy, security protocols, web protocol security, and mobile and wireless security.

Перейти: https://doi.org/10.1007/978-3-319-71075-4

Дод.точки доступу:
Stajano, Frank. \ed.\; Anderson, Jonathan. \ed.\; Christianson, Bruce. \ed.\; Matyas, Vashek. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

15.


   
    Electronic Participation [[electronic resource] :] : 9th IFIP WG 8.5 International Conference, ePart 2017, St. Petersburg, Russia, September 4-7, 2017, Proceedings / / ed. Parycek, Peter. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 161 p. 13 illus. - Б. ц.
    Зміст:
Methodological Issues in eParticipation --
eParticipation Implementations --
Policy Modeling and Policy Informatics --
Critical Reflections. .
Рубрики: Computers and civilization.
   Application software.

   Coding theory.

   Information theory.

   Computers.

   Law and legislation.

   E-commerce.

   Computers and Society.

   Information Systems Applications (incl. Internet).

   Coding and Information Theory.

   Legal Aspects of Computing.

   e-Commerce/e-business.

Анотація: This book constitutes the proceedings of the 9th IFIP WG 8.5 International Conference on Electronic Participation, ePart 2017, held in St. Petersburg, Russia, in September 2017. The 11 revised full papers presented in this book were carefully reviewed and selected from 14 submissions. The papers reflect completed multi-disciplinary research ranging from policy analysis and conceptual modeling to programming and visualization of simulation models. They are organized in four topical threads: methodological issues in e-participation; e-participation implementations; policy modeling and policy informatics; critical reflections. .

Перейти: https://doi.org/10.1007/978-3-319-64322-9

Дод.точки доступу:
Parycek, Peter. \ed.\; Charalabidis, Yannis. \ed.\; Chugunov, Andrei V. \ed.\; Panagiotopoulos, Panos. \ed.\; Pardo, Theresa A. \ed.\; S?bo, Oystein. \ed.\; Tambouris, Efthimios. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

16.


   
    Computer Network Security [[electronic resource] :] : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings / / ed. Rak, Jacek. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 362 p. 141 illus. - Б. ц.
    Зміст:
Critical Infrastructure Protection and Visualization --
Security and Resilience of Network Systems --
Adaptive Security --
Anti-malware Techniques: Detection, Analysis, Prevention --
Security of Emerging Technologies.-Applied Cryptography --
New Ideas and Paradigms for Security.
Рубрики: Computer security.
   Computer communication systems.

   Computers and civilization.

   Computers.

   Law and legislation.

   Data encryption (Computer science).

   Computer system failures.

   Systems and Data Security.

   Computer Communication Networks.

   Computers and Society.

   Legal Aspects of Computing.

   Cryptology.

   System Performance and Evaluation.

Анотація: This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017. The 12 revised full papers, 13 revised short presentations, and 3 invited papers were carefully reviewed and selected from a total of 40 submissions. The papers are organized in topical sections on Critical Infrastructure Protection and Visualization; Security and Resilience of Network Systems; Adaptive Security; Anti-malware Techniques: Detection, Analysis, Prevention; Security of Emerging Technologies; Applied Cryptography; New Ideas and Paradigms for Security.

Перейти: https://doi.org/10.1007/978-3-319-65127-9

Дод.точки доступу:
Rak, Jacek. \ed.\; Bay, John. \ed.\; Kotenko, Igor. \ed.\; Popyack, Leonard. \ed.\; Skormin, Victor. \ed.\; Szczypiorski, Krzysztof. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

17.


   
    Information Systems Security [[electronic resource] :] : 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings / / ed.: Shyamasundar, Rudrapatna K., Singh, Virendra., Vaidya, Jaideep. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 415 p. 112 illus. - Б. ц.
    Зміст:
Privacy/cryptography --
Systems security --
Security analysis --
Identity management and access control --
Security attacks and detection --
Network security.
Рубрики: Data protection.
   Data structures (Computer science).

   Computers and civilization.

   Computer communication systems.

   Computers.

   Law and legislation.

   Application software.

   Security.

   Data Structures and Information Theory.

   Computers and Society.

   Computer Communication Networks.

   Legal Aspects of Computing.

   Information Systems Applications (incl. Internet).

Анотація: This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017. The 17 revised full papers and 7 short papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers address the following topics:  privacy/cryptography, systems security, security analysis, identity management and access control, security attacks and detection, network security.

Перейти: https://doi.org/10.1007/978-3-319-72598-7

Дод.точки доступу:
Shyamasundar, Rudrapatna K. \ed.\; Singh, Virendra. \ed.\; Vaidya, Jaideep. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

18.


   
    Electronic Government and the Information Systems Perspective [[electronic resource] :] : 6th International Conference, EGOVIS 2017, Lyon, France, August 28-31, 2017, Proceedings / / ed.: Ko, Andrea., Francesconi, Enrico. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 307 p. 69 illus. - Б. ц.
Рубрики: Computers and civilization.
   Application software.

   Coding theory.

   Information theory.

   E-commerce.

   Computers.

   Law and legislation.

   Information storage and retrieval.

   Computers and Society.

   Information Systems Applications (incl. Internet).

   Coding and Information Theory.

   e-Commerce/e-business.

   Legal Aspects of Computing.

   Information Storage and Retrieval.

Анотація: This book constitutes the refereed proceedings of the 6th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2017, held in Lyon, France, in August 2017. The 20 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers areorganized in the following topical sections: digitalization and transparency; open data ecosystems; intelligent systems in e-government; e-government research and intelligent systems; m-government and inclusion; e-government cases - data knowledge management; and knowledge management in the context of e-government.

Перейти: https://doi.org/10.1007/978-3-319-64248-2

Дод.точки доступу:
Ko, Andrea. \ed.\; Francesconi, Enrico. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

19.


    Voigt, Paul.
    The EU General Data Protection Regulation (GDPR) [[electronic resource] :] : a Practical Guide / / Paul. Voigt, von dem Bussche, Axel. ; . - 1st ed. 2017. - [S. l. : s. n.]. - IX, 383 p. - Б. ц.
    Зміст:
1 Introduction and „Checklist“ --
2 Scope of Application of the GDPR --
3 Organizational Requirements --
4 Material Requirements --
5 Rights of Data Subjects --
6 Interaction with the Supervisory Authorities --
7 Enforcement and Fines under the GDPR --
8 National Peculiarities --
9 Special Data Processing Activities --
10 Practical Implementation of the Requirements under the GDPR.
Рубрики: Law—Europe.
   Mass media.

   Law.

   Computers.

   Law and legislation.

   European Economic Community literature.

   European Law.

   IT Law, Media Law, Intellectual Property.

   Legal Aspects of Computing.

   European Integration.

Анотація: This book provides expert advice on the practical implementation of the European Union’s General Data Protection Regulation (GDPR) and systematically analyses its various provisions. Examples, tables, a checklist etc. showcase the practical consequences of the new legislation. The handbook examines the GDPR’s scope of application, the organizational and material requirements for data protection, the rights of data subjects, the role of the Supervisory Authorities, enforcement and fines under the GDPR, and national particularities. In addition, it supplies a brief outlook on the legal consequences for seminal data processing areas, such as Cloud Computing, Big Data and the Internet of Things. Adopted in 2016, the General Data Protection Regulation will come into force in May 2018. It provides for numerous new and intensified data protection obligations, as well as a significant increase in fines (up to 20 million euros). As a result, not only companies located within the European Union will have to change their approach to data security; due to the GDPR’s broad, transnational scope of application, it will affect numerous companies worldwide.

Перейти: https://doi.org/10.1007/978-3-319-57959-7

Дод.точки доступу:
von dem Bussche, Axel.; Voigt, Paul. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

20.


   
    The Unaccountable State of Surveillance [[electronic resource] :] : exercising Access Rights in Europe / / ed. Norris, Clive. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XII, 499 p. 22 illus. - Б. ц.
    Зміст:
Section One: 1. Comparative Legal Analysis of Informational Rights in Europe --
2. Meta-Analysis of Exercising Access Rights in Europe --
Section Two: 3. Exercising Access Rights in Austria --
4. Exercising Access Rights in Belgium --
5. Exercising Access Rights in Germany --
6. Exercising Access Rights in Hungary --
7. Exercising Access Rights in Italy --
8. Exercising Access Rights in Luxembourg --
9. Exercising Access Rights in Norway --
10. Exercising Access Rights in Slovakia --
11. Exercising Access Rights in Spain --
12. Exercising Access Rights in the United Kingdom --
Section Three: 13. Conclusions.
Рубрики: Mass media.
   Law.

   Computers.

   Law and legislation.

   Law—Europe.

   Human rights.

   IT Law, Media Law, Intellectual Property.

   Legal Aspects of Computing.

   European Law.

   Human Rights.

Анотація: This book examines the ability of citizens across ten European countries to exercise their democratic rights to access their personal data. It presents a socio-legal research project, with the researchers acting as citizens, or data subjects, and using ethnographic data collection methods. The research presented here evidences a myriad of strategies and discourses employed by a range of public and private sector organizations as they obstruct and restrict citizens' attempts to exercise their informational rights. The book also provides an up-to-date legal analysis of legal frameworks across Europe concerning access rights and makes several policy recommendations in the area of informational rights. It provides a unique and unparalleled study of the law in action which uncovered the obstacles that citizens encounter if they try to find out what personal data public and private sector organisations collect and store about them, how they process it, and with whom they share it. These are simple questions to ask, and the right to do so is enshrined in law, but getting answers to these questions was met by a raft of strategies which effectively denied citizens their rights. The book documents in rich ethnographic detail the manner in which these discourses of denial played out in the ten countries involved, and explores in depth the implications for policy and regulatory reform.

Перейти: https://doi.org/10.1007/978-3-319-47573-8

Дод.точки доступу:
Norris, Clive. \ed.\; de Hert, Paul. \ed.\; L'Hoiry, Xavier. \ed.\; Galetta, Antonella. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

 1-20    21-24 
 
© Міжнародна Асоціація користувачів і розробників електронних бібліотек і нових інформаційних технологій
(Асоціація ЕБНІТ)