Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
Years
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    Waltham, MA : Morgan Kaufmann
    ISBN: 9780124114746 , 9780124104877 (Sekundärausgabe) , 0124104878 (Sekundärausgabe)
    Language: English
    Edition: Online-Ausg. Sebastopol, CA O'Reilly Media Inc. Online-Ressource Safari Tech Books Online ISBN 9780124104877 Online
    Edition: ISBN 0124104878 Online
    Edition: [Online-Ausg.]
    DDC: 303.4833
    Note: Online-Ausg.:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780128008119 , 0128008113
    Language: English
    Pages: 1 online resource (1 v.)
    Parallel Title: Erscheint auch als
    Keywords: Computer crimes ; Investigation ; Handbooks, manuals, etc ; Electronic books ; local ; Electronic books
    Abstract: Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime. Written by experts in cyber crime, digital investigations, and counter-terrorism Learn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigators Keep up to date on current national and international law regarding cyber crime and cyber terrorism See just how significant cyber crime has become, and how important cyber law enforcement is in the modern world
    Note: Includes bibliographic references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Waltham, MA : Morgan Kaufmann
    ISBN: 9780124104877 , 0124104878
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Information technology ; Security measures ; Computer crimes ; Prevention ; Cyberterrorism ; Prevention ; Electronic surveillance ; Electronic books ; local ; Electronic books
    Abstract: Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Saint Louis : Elsevier Science | Ann Arbor, Michigan : ProQuest
    ISBN: 9780124104877
    Language: English
    Pages: 1 Online-Ressource (662 pages)
    Series Statement: Emerging Trends in Computer Science and Applied Computing
    DDC: 005.8
    RVK:
    Abstract: Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing.
    Note: Description based on publisher supplied metadata and other sources
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9783030932664
    Language: English
    Pages: 1 Online-Ressource (xxxi, 394 Seiten)
    Series Statement: Security informatics and law enforcement
    Parallel Title: Erscheint auch als
    DDC: 303.4833086912
    Keywords: Emigration and immigration ; Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9783030220020
    Language: English
    Pages: 1 Online-Ressource (XXI, 280 p. 44 illus. in color)
    Edition: 1st ed. 2019
    Series Statement: Security Informatics and Law Enforcement
    Parallel Title: Printed edition
    Parallel Title: Printed edition
    DDC: 302.30285
    Keywords: Social media ; Electrical engineering ; Police ; Computers ; Computer communication systems
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9783030254360
    Language: English
    Pages: 1 online resource (303 pages)
    Series Statement: Security Informatics and Law Enforcement Ser.
    Parallel Title: Erscheint auch als
    DDC: 303.484
    Keywords: Radicalization-Psychological aspects.. ; Radicalization ; Electronic books
    Note: Description based on publisher supplied metadata and other sources
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9783030932664
    Language: English
    Pages: 1 Online-Ressource(XXXI, 394 p. 35 illus., 27 illus. in color.)
    Edition: 1st ed. 2022.
    Series Statement: Security Informatics and Law Enforcement
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Telecommunication. ; Public administration. ; Emigration and immigration—Government policy.
    Abstract: Introduction -- Part 1 – The relevance of ICTs in migration -- Minority rights -- Migration knowledge production and the shaping of perceptions of Europe -- Integrate services to integrate migrants -- Part 2 – Reviewing perspectives and experiences -- The Challenges and opportunities of ICT along the Road to Europe -- From a digital breach to a usage and positioning gap -- Developing migration focused ICT tools with marginalised groups -- ICTs and Migration -- The Challenges of co-design and co-creation for migrant integration -- Easing migrants’ access to public services -- Part 3 – Developing migration-related ICTs -- Micado Architecture -- The challenges of co-creation processes on developing ICT solutions for migrant inclusion -- Experiences from the development of ICT tools for and with migrants through NADINE platform -- Equity, Diversity and Inclusion in designing AI-based solutions for migrants integration: REBUILD project -- Skill matching for migrant guidance based on AI tools -- Personalised interaction or how we can improve migrants’ experience when using a digital companion through a mobile app -- Immerse Architecture -- Authoring tools for young migrants -- Part 4 – Legal, ethical and societal considerations -- Assessing the socio-economic, technological and political impact of ICT tools for migrant integration -- Protecting Migrants’ Data -- Shaping ICT policies for integrative and inclusive digital services -- Legal and Ethical Frameworks Applicable to Social Media Analytics in the Context of Migration -- The Legal Framework Applicable to the Design and Use of ICTs in Migrants’ Integration -- Conclusion.
    Abstract: The book provides a holistic review, presenting a multi-stakeholder, multi-disciplinary, international, and evidence-based approach to Information and Communications Technology (ICT) in migration. The book brings together different views and multifaceted responses to ICT-based migration management, examining their overlap, conflict, and synergies. The book is a major addition to the field, tackling important debates concerning humanitarianism and securitization in the reception of migrants, as well as exploring the role of digital technology in aiding migrant integration. The authors explore contentious areas such as the use of new technologies deployed on borders for migration management and border security under the umbrella of smart border solutions including drones, AI algorithms, and face recognition, which are widely criticized for ignoring the fundamental human rights of migrants. The research presented will depart from the euphoric appraisals that technology has made things easier for migrants and those who assist them, to critically examine the bane and boon, benefits and afflictions, highlighting the barriers, as well as the solutions, including several under-researched aspects of digital surveillance and the digital divide. This edited volume has been developed by the MIICT project, funded under the EU Horizon 2020 Action and Innovation programme, under grant agreement No 822380.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780128019733 , 0128019735
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: National security ; United States ; Data protection ; Science and state ; Electronic books ; Electronic books ; local
    Abstract: Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue. The strategic frameworks and critical factors presented in Application of Big Data for National Security consider technical, legal, ethical, and societal impacts, but also practical considerations of Big Data system design and deployment, illustrating how data and security concerns intersect. In identifying current and future technical and operational challenges it supports law enforcement and government agencies in their operational, tactical and strategic decisions when employing Big Data for national security Contextualizes the Big Data concept and how it relates to national security and crime detection and prevention Presents strategic approaches for the design, adoption, and deployment of Big Data technologies in preventing terrorism and reducing crime Includes a series of case studies and scenarios to demonstrate the application of Big Data in a national security context Indicates future directions for Big Data as an enabler of advanced crime prevention and detection
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780128013793
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Cloud computing ; Data processing service centers ; Energy conservation ; Big data ; Electronic books ; local ; Electronic books
    Abstract: We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates that centralized computing infrastructures (data centres) currently use 7 giga watts of electricity during peak loads. This translates into about 61 billion kilowatt hours of electricity used. By the EPA's estimates, power-hungry data centres consume the annual output of 15 average-sized power plants. One of the top constraints to increasing computing power, besides the ability to cool, is simply delivering enough power to a given physical space. Green Information Technology: A Sustainable Approach offers in a single volume a broad collection of practical techniques and methodologies for designing, building and implementing a green technology strategy in any large enterprise environment, which up until now has been scattered in difficult-to-find scholarly resources. Included here is the latest information on emerging technologies and their environmental impact, how to effectively measure sustainability, discussions on sustainable hardware and software design, as well as how to use big data and cloud computing to drive efficiencies and establish a framework for sustainability in the information technology infrastructure. Written by recognized experts in both academia and industry, Green Information Technology: A Sustainable Approach is a must-have guide for researchers, computer architects, computer engineers and IT professionals with an interest in greater efficiency with less environmental impact. Introduces the concept of using green procurement and supply chain programs in the IT infrastructure. Discusses how to use big data to drive efficiencies and establish a framework for sustainability in the information technology infrastructure. Explains how cloud computing can be used to consolidate corporate IT environments using large-scale shared infrastructure reducing the overall environmental impact and unlocking new efficiencies. Provides specific use cases for Green IT such as data center energy efficiency and cloud computing sustainability and risk.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...