Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (29)
  • HU-Berlin Edoc
  • Computer security  (15)
  • Mensch-Maschine-Kommunikation  (14)
  • Computer Science  (29)
Datasource
Material
Language
  • 1
    ISBN: 9783988900302 , 9783988900319 , 9783988900326
    Language: German
    Pages: 1 Online-Ressource (330 Seiten)
    Edition: 2., überarbeitete und aktualisierte Auflage
    Parallel Title: Erscheint auch als Geis, Thomas Basiswissen Usability und User Experience
    DDC: 005.437
    RVK:
    RVK:
    Keywords: Human-computer interaction ; Requirements engineering ; COMPUTERS / Certification Guides / General ; COMPUTERS / Programming / Systems Analysis & Design ; Mensch-Computer-Interaktion ; Human-centred Design ; Nutzungskontext ; Nutzungsqualität ; Produktentwicklung ; Requirements Engineering ; Usability ; User Requirements ; Zertifizierung ; Zertifizierung CPUX-UR ; user experience ; Mensch-Maschine-Kommunikation ; Produktentwicklung ; Produktgestaltung ; Requirements engineering ; Faktor Mensch ; Kontextbezogenes System ; Projektmanagement ; CPUX ; DIN EN ISO 9241 ; Benutzerfreundlichkeit ; Mensch-Maschine-Kommunikation ; Softwareentwicklung ; Softwareergonomie ; CPUX
    Abstract: Während Usability (Gebrauchstauglichkeit) und User Experience (Benutzererlebnis) viele Jahre als Schlagwort für die Produkte einiger weniger Hersteller wahrgenommen wurden, finden ihre inzwischen genormten Konzepte heute mit guten Resultaten in der industriellen Praxis breite Anwendung. Die Autoren geben einen fundierten Einstieg und praxisorientierten Überblick über die Kompetenzfelder "Usability und User Experience" und deren Zusammenspiel. Dabei erläutern zahlreiche Beispiele für Gestaltungsprinzipien, Gestaltungsregeln, Design Patterns, Benutzererfordernisse und Nutzungsanforderungen die methodischen Grundlagen. Aus dem Inhalt:" Der menschzentrierte Gestaltungsprozess" Den Nutzungskontext verstehen und spezifizieren" Nutzungsanforderungen spezifizieren" Gebrauchstaugliche Gestaltungslösungen entwickeln" Gestaltungslösungen evaluieren.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Oxford : Oxford University Press
    ISBN: 9780191840166
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Oxford handbooks online
    Series Statement: Political Science
    Parallel Title: Erscheint auch als The Oxford handbook of cyber security
    DDC: 005.8
    RVK:
    Keywords: Computer security ; Computer networks Security measures ; Computersicherheit ; Cyberattacke ; Computerkriminalität ; Sicherheitspolitik
    Abstract: 'The Oxford Handbook of Cyber Security' presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, amd national level.
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9783847424949 , 3847424947
    Language: English
    Pages: 306 Seiten , 22 cm, 447 g
    Series Statement: L' AGENda vol. 8
    Series Statement: L' AGENda
    Parallel Title: Erscheint auch als Gendered configurations of humans and machines
    DDC: 306.46
    RVK:
    RVK:
    RVK:
    Keywords: Künstliche Intelligenz ; Geschlechterverhältnis ; Macht ; Digitalisierung ; Mensch-Maschine-Kommunikation ; artificial intelligence ; Digitalisierung ; digitalization ; gender relations ; gender studies ; Geschlechterforschung ; Geschlechterverhältnisse ; human-machine interaction ; interdisciplinarity ; Interdisziplinarität ; Künstliche Intelligenz ; Mensch-Maschine-Interaktion ; science and technology studies ; Technikforschung ; Konferenzschrift 2019 ; Konferenzschrift 2019 ; Konferenzschrift 2019 ; Konferenzschrift 2019 ; Konferenzschrift 2019 ; Aufsatzsammlung ; Konferenzschrift 2019 ; Aufsatzsammlung ; Digitalisierung ; Künstliche Intelligenz ; Mensch-Maschine-Kommunikation ; Macht ; Geschlechterverhältnis
    Note: Beiträge, hervorgegangen aus der "Interdisciplinary Conference on the Relations of Humans, Machines and Gender", welche in Braunschweig vom 16.-19. Oktober 2019 stattfand
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Language: English , German
    Pages: 1 Online-Ressource (xiii, 125 Seiten)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Yablonski, Jon Laws of UX
    RVK:
    Keywords: Electronic books ; local ; Mensch-Maschine-Kommunikation ; Webdesign ; Gebrauchsgrafik ; Benutzerfreundlichkeit ; Verhaltenspsychologie
    Abstract: Jon Yablonski erklärt in diesem Buch, wie UX-Designerinnen Grundprinzipien aus der Psychologie nutzen können, um eine bessere User Experience zu generieren. Anstatt Benutzerinnen zu zwingen, sich an das Design eines Produkts (z. B. App) anzupassen, hilft dieser praktische Leitfaden dabei, das Design danach auszurichten, wie Benutzer*innen sich verhalten und mit digitalen Schnittstellen interagieren, um ihre Nutzung einfacher und angenehmer zu gestalten. Dabei greift der Autor auf bekannte Regeln und Prinzipien aus der psychologischen Forschung zurück und überträgt sie in die UX-Design-Welt. So sprechen wir beispielsweise einer App mit schönem Design mehr Kompetenz zu und verzeihen ihr eher Fehler, oder erwarten von einem Onlineshop, dass der Kaufprozess so funktionieren, wie wir es von anderen Shops gewohnt sind. Außerdem können wir eine große Menge an Informationen besser speichern und verarbeiten, wenn sie in Chunks gegliedert sind, weshalb etwa Texte, die mithilfe von Überschriften und Absätzen gegliedert sind, eine höhere UX generieren als ein langer Fließtext, der die User überfordert. Nachdem der Autor die verschiedenen Prinzipien erklärt und an anschaulichen, einfach nachzuvollziehenden Beispielen demonstriert hat, zeigt er, wie man diese Prinzipien praktisch für die eigene Arbeit und im Team nutzen kann. Zusätzlich geht er auch auf die ethischen Komponenten ein (Beispiele: Endlos-Scrollen, Like-Button).
    Note: Online resource; Title from title page (viewed September 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : mitp Verlag | Boston, MA : Safari
    Language: English , German
    Pages: 1 online resource (376 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Russell, Stuart J., 1962 - Human compatible
    DDC: 006.3
    RVK:
    Keywords: Electronic books ; local ; Informationsgesellschaft ; Technischer Fortschritt ; Künstliche Intelligenz ; Kontrolle ; Gesellschaft ; Entwicklung ; Zukunft ; Künstliche Intelligenz ; Kontrolle ; Informationsgesellschaft ; Technischer Fortschritt ; Mensch-Maschine-Kommunikation
    Abstract: Der bekannte KI-Pionier Stuart Russell zeigt die Chancen und Risiken der Künstlichen Intelligenz auf Eine Superintelligenz als Zukunftsszenario - wie wir es schaffen, die Kontrolle zu behalten Eine realistische und kritische Betrachtung der KI mit anschaulichen Analogien und konkreten Lösungsvorschlägen In diesem bahnbrechenden Buch über die größte Frage bei der Entwicklung der KI zeigt der bekannte KI-Forscher Stuart Russell, wieso er sein eigenes Forschungsgebiet als Bedrohung für die menschliche Spezies ansieht und wie wir den aktuellen Kurs ändern können, bevor es zu spät ist. Niemand könnte die Chancen und Risiken dieser Zukunftstechnologie besser beurteilen als Stuart Russell, der seit mehr als einer Dekade an vorderster Front der KI-Forschung steht. Mit brillanten Analogien erklärt er, wie KI genau funktioniert und welche enormen Chancen sie mit sich bringt. Doch wir müssen sicherstellen, dass wir niemals die Kontrolle über diese Maschinen verlieren, die mächtiger sind als wir selbst. Russell zeigt auf, wie wir die schlimmsten Bedrohungen abwenden, indem wir die Grundlagen der KI neu denken, um zu garantieren, dass die Maschinen unsere Ziele verfolgen, nicht ihre. Fundiert, eindringlich und visionär ist Human Compatible ein Buch, das jeder lesen sollte, um die Zukunft zu verstehen, die schneller kommt, als wir denken. Über den Autor: Stuart Russell ist Professor der Informatik am Lehrstuhl Engineering der University of California, Berkeley. Er hat als stellvertretender Vorsitzender des Councils über Künstliche Intelligenz und Robotik des Weltwirtschaftsforums und Berater für die Rüstungskontrolle der Vereinten Nationen fungiert. Darüber hinaus ist er Fellow von Andrew Carnegie sowie der Association for Computing Machinery und der American Association for the Advancement of Science.
    Note: Online resource; Title from title page (viewed June 19, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9783476056047
    Language: German
    Pages: 1 Online-Ressource (IX, 380 Seiten) , Illustrationen
    Series Statement: Springer eBooks
    Series Statement: J.B. Metzler Humanities
    Parallel Title: Erscheint auch als Mensch-Maschine-Interaktion
    RVK:
    RVK:
    RVK:
    Keywords: Philosophy (General) ; Philosophy, general ; Philosophy. ; Mensch-Maschine-Kommunikation ; Benutzeroberfläche ; Faktor Mensch ; Mensch-Maschine-Kommunikation ; Künstliche Intelligenz
    Abstract: I Vorgeschichte(n): Das Verhältnis von Menschen und Maschinen als Grundthema der (abendländischen) Kultur -- II Mensch-Maschine-Interaktionen: Paradigmen, Wandel, Brüche -- A Änderung der Arbeits- und Lebenswelt durch die Industrialisierung bis zum Ersten Weltkrieg -- B Maschinen in Projektionen und Relationen -- C Mensch-Maschine-Visionen und ›Über-Maschinen‹ zwischen Utopie und Dystopie -- D Menschen und Maschinen in der Technosphäre -- E Analogisierung und Nachahmung -- F Maschine und Mensch als Partner/innen oder Gegner/innen? -- G Menschliche und maschinelle Identitäten im Wandel -- H Mensch-Maschine-Schnittstellen in der Biotechnologie -- III Begriffe und Konzepte -- IV Ethische Fragen: Normen, Herausforderungen, Perspektiven -- A Exemplarische aktuelle ethische Diskussionen in Mensch-Maschine-Interaktionen -- B Entstehung neuer Bereichsethiken.-
    Abstract: Das Handbuch bietet einen Überblick über die technischen, historischen, sozialen, medialen, kulturwissenschaftlichen und technikphilosophischen Dimensionen verschiedener Typen von Mensch-Maschine-Interaktion sowie über deren ethische Implikationen. Dabei werden zum einen wissenshistorische Analysen der Diskurse in Philosophie, Literatur und Technik sowie ihrer medialen, apparativen und literalen Praktiken von ca. 1870 bis in die Gegenwart verfolgt (Historischer Teil). Zum anderen wird das komplexe Verhältnis von Menschen und Maschinen anhand von zentralen Begriffs- und Problemfeldern dargestellt und kritisch befragt (Systematischer Teil)
    Note: Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9783319582320
    Language: English
    Pages: 1 Online-Ressource (xvi, 260 Seiten) , Illustrationen
    Series Statement: Dynamics of virtual work
    Parallel Title: Erscheint auch als
    DDC: 306.36
    RVK:
    RVK:
    RVK:
    Keywords: Social sciences ; Social policy ; Economic sociology ; Industrial sociology ; Social Sciences ; Sociology of Work ; Digital/New Media ; Organizational Studies, Economic Sociology ; Science and Technology Studies ; Privacy ; Social Policy ; Mensch-Maschine-Kommunikation ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Mensch-Maschine-Kommunikation
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    San Francisco, CA : No Starch Press
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als Sweigart, Al Cracking codes with Python
    DDC: 005.8
    RVK:
    Keywords: Data encryption (Computer science) ; Python (Computer program language) ; Computer security ; Hacking ; Electronic books ; Electronic books ; local ; Python ; Python
    Abstract: "Learn how to program in Python while making and breaking ciphers-algorithms used to create and send secret messages! After a crash course in Python programming basics, you'll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You'll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today's online transactions, including digital signatures, email, and Bitcoin. Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you'll have learned how to code in Python and you'll have the clever programs to prove it! You'll also learn how to: • Combine loops, variables, and flow control statements into real working programs• Use dictionary files to instantly detect whether decrypted messages are valid English or gibberish• Create test programs to make sure that your code encrypts and decrypts correctly• Code (and hack!) a working example of the affine cipher, which uses modular arithmetic to encrypt a message• Break ciphers with techniques such as brute-force and frequency analysis There's no better way to learn to code than to play with real programs. Cracking Codes with Python makes the learning fun!"
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9783958456372 , 3958456375
    Language: German
    Pages: 1 Online-Ressource , illustrations
    Edition: 1. Auflage.
    RVK:
    RVK:
    RVK:
    Keywords: Internet ; Security measures ; Computer security ; Data protection ; Privacy, Right of ; Electronic books ; Electronic books ; local ; Internet ; Personenbezogene Daten ; Privatsphäre ; Datenschutz ; Internet ; Daten ; Anonymität
    Abstract: Ob Sie wollen oder nicht - jede Ihrer Online-Aktivitäten wird beobachtet und analysiert. Sie haben keine Privatsphäre. Im Internet ist jeder Ihrer Klicks für Unternehmen, Regierungen und kriminelle Hacker uneingeschränkt sichtbar. Ihr Computer, Ihr Smartphone, Ihr Auto, Ihre Alarmanlage, ja sogar Ihr Kühlschrank bieten potenzielle Angriffspunkte für den Zugriff auf Ihre Daten. Niemand kennt sich besser aus mit dem Missbrauch persönlicher Daten als Kevin D. Mitnick. Als von der US-Regierung ehemals meistgesuchter Computer-Hacker kennt er alle Schwachstellen und Sicherheitslücken des digitalen Zeitalters. Seine Fallbeispiele sind spannend und erschreckend: Sie werden Ihre Aktivitäten im Internet neu überdenken. Mitnick weiß aber auch, wie Sie Ihre Daten bestmöglich schützen. Er zeigt Ihnen anhand zahlreicher praktischer Tipps und Schritt-für-Schritt-Anleitungen, was Sie tun können, um online und offline anonym zu sein. Bestimmen Sie selbst über Ihre Daten. Lernen Sie, Ihre Privatsphäre im Internet zu schützen. Kevin D. Mitnick zeigt Ihnen, wie es geht. Hinterlassen Sie keine Spuren • Sichere Passwörter festlegen und verwalten • Mit dem Tor-Browser im Internet surfen, ohne Spuren zu hinterlassen • E-Mails und Dateien verschlüsseln und vor fremden Zugriffen schützen • Öffentliches WLAN, WhatsApp, Facebook & Co. sicher nutzen • Sicherheitsrisiken vermeiden bei GPS, Smart-TV, Internet of Things und Heimautomation • Eine zweite Identität anlegen und unsichtbar werden
    Note: Authorized German translation of the English language edition: The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data. Cf. Title page verso. - Place of publication from publisher's website. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed January 4, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780128038383 , 0128038381
    Language: English
    Pages: 1 online resource (273 pages) , illustrations
    Series Statement: Syngress advanced topics in information security
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    RVK:
    Keywords: COMPUTERS / Security / General ; Computer networks / Security measures ; Computer security ; Cyber intelligence (Computer security) ; Computer security ; Computer networks Security measures ; Cyber intelligence (Computer security) ; Informationssystem ; Unternehmen ; Datensicherung ; Computersicherheit ; Rechnernetz ; Rechnernetz ; Computersicherheit ; Datensicherung ; Unternehmen ; Datensicherung ; Informationssystem
    Abstract: "Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic.
    Abstract: The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system's performance.
    Abstract: Presents the most current and leading edge research on system safety and security, featuring a panel of top experts in the field Includes several research advancements published for the first time, including the use of 'goal structured notation' together with a 'judgment calculus' and their automation as a 'rule set' to facilitate systems safety and systems security process execution in compliance with existing standards Presents for the first time the latest research in the field with the unique perspective that systems safety and systems security are inextricably intertwined Includes coverage of systems architecture, cyber physical systems, tradeoffs between safety, security, and performance, as well as the current methodologies and technologies and implantation practices for system safety and security"--Provided by publisher
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Cambridge, MA : Syngress, an imprint of Elsevier
    ISBN: 9780128045053 , 0128045051 , 0128044586 , 9780128044582
    Language: English
    Pages: 1 online resource (144 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 004.67/8
    RVK:
    RVK:
    Keywords: COMPUTERS / Computer Literacy ; COMPUTERS / Computer Science ; COMPUTERS / Data Processing ; COMPUTERS / Hardware / General ; COMPUTERS / Information Technology ; COMPUTERS / Machine Theory ; COMPUTERS / Reference ; Computer networks / Security measures ; Computer security ; Internet of things ; Internet of things ; Computer networks Security measures ; Computer security ; Internet der Dinge ; Computersicherheit ; Internet der Dinge ; Computersicherheit
    Abstract: "Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Wiesbaden : Springer Fachmedien Wiesbaden | Imprint: Springer VS
    ISBN: 9783658186609
    Language: English
    Pages: 1 Online-Ressource (IX, 210 p. 35 illus)
    Parallel Title: Erscheint auch als
    DDC: 302.23
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Social sciences ; Communication ; Sociology ; Mass media ; Soziale Konstruktion ; Anthropomorphismus ; Sprachdialogsystem ; Mensch-Maschine-Kommunikation ; Avatar ; Affective Computing ; Geschlechtsunterschied ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift ; Mensch-Maschine-Kommunikation ; Sprachdialogsystem ; Avatar ; Anthropomorphismus ; Geschlechtsunterschied ; Soziale Konstruktion ; Affective Computing
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Cambridge, MA : Syngress is an imprint of Elsevier
    ISBN: 9780128033357 , 0128033355 , 012803291X , 9780128032916
    Language: English
    Pages: 1 online resource
    Edition: Second edition
    Parallel Title: Erscheint auch als
    DDC: 364.16/8
    RVK:
    Keywords: Microsoft Windows (Computer file) ; Microsoft Windows (Computer file) ; SOCIAL SCIENCE / Criminology ; Component software ; Computer networks / Security measures ; Computer security ; Operating systems (Computers) ; Operating systems (Computers) ; Computer crimes Investigation ; Methodology ; Computer networks Security measures ; Computer security ; Component software ; Datensicherung ; Computerkriminalität ; Rechnernetz ; Computerforensik ; Datensicherung ; Rechnernetz ; Computerforensik ; Computerkriminalität
    Abstract: Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. Named a 2011 Best Digital Forens
    Note: Includes index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Cambridge, MA : Syngress is an imprint of Elsevier
    ISBN: 9780128004784 , 0128004789 , 0128000066 , 9780128000069
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Security / Networking ; Big data ; Computer security ; Computer security ; Big data ; Computersicherheit ; Bedrohung ; Big Data ; Prognose ; Computersicherheit ; Big Data ; Bedrohung ; Prognose
    Abstract: This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools
    Note: Includes index , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9781137400529
    Language: English
    Pages: 1 Online-Ressource (XIII, 222 Seiten)
    Edition: Springer eBook Collection. Political Science and International Studies
    Series Statement: New security challenges series
    Parallel Title: Erscheint auch als Christou, George, 1973 - Cybersecurity in the European Union
    DDC: 005.8
    RVK:
    RVK:
    Keywords: Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Außenpolitik ; Politische Wissenschaft ; Computersicherheit ; Europäische Union ; Internet ; Internetkriminalität ; Politik ; Sicherheit
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780124201842 , 0124201849
    Language: English
    Pages: 1 online resource (xix, 439 pages) , illustrations
    Edition: Second edition
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 670.42/7
    RVK:
    Keywords: TECHNOLOGY & ENGINEERING / Industrial Engineering ; TECHNOLOGY & ENGINEERING / Industrial Technology ; TECHNOLOGY & ENGINEERING / Manufacturing ; TECHNOLOGY & ENGINEERING / Technical & Manufacturing Industries & Trades ; Computer security ; Corporate Network ; Computersicherheit ; Intelligentes Stromnetz ; SCADA / Programm ; Process control Security measures ; Computer security ; Intelligentes Stromnetz ; Computersicherheit ; SCADA ; Corporate Network ; Computersicherheit ; Corporate Network ; Intelligentes Stromnetz ; SCADA
    Abstract: Annotation
    Note: Previous edition: 2011 , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9780128005064 , 0128005068
    Language: English
    Pages: 1 online resource (xv, 166 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer security ; Information resources management / Security measures ; Computer security ; Information resources management Security measures ; Big data Security measures ; Big Data ; Datensicherung ; Big Data ; Datensicherung
    Abstract: The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. --
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Waltham, MA : Syngress
    ISBN: 9780128010969 , 0128010967 , 0128008997 , 9780128008997
    Language: English
    Pages: 1 online resource (xvii, 262 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 363.28/9
    RVK:
    Keywords: HISTORY / Military / Other ; TECHNOLOGY & ENGINEERING / Military Science ; Computer security ; Private security services / Management ; Security systems / Management ; Computer Security ; Computer security ; Private security services Management ; Security systems Management ; Computersicherheit ; Unternehmen ; Unternehmen ; Computersicherheit
    Abstract: Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Organizations need to be committed to defending their own assets and their customers' information. This book will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. It explains how to develop and build a security operations center; shows how to gather invaluable intelligence to protect your organization; helps you evaluate the pros and cons behind each decision during the SOC-building process. --
    Note: Includes index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Book
    Book
    Cambridge, Massachusetts :The MIT Press,
    ISBN: 978-0-262-02957-5
    Language: English
    Pages: XX, 502 Seiten ; , 24 cm.
    Series Statement: Software studies
    DDC: 004
    RVK:
    RVK:
    RVK:
    Keywords: Economies of scale. ; Software. ; Souveränität. ; Geopolitik. ; Computer. ; Gesellschaft. ; Ubiquitous Computing. ; Mensch-Maschine-Kommunikation. ; Softwarearchitektur. ; Economies of scale ; Software ; Souveränität ; Geopolitik ; Computer ; Gesellschaft ; Ubiquitous Computing ; Mensch-Maschine-Kommunikation ; Softwarearchitektur
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Book
    Book
    Cambridge, Massachusetts [u.a.] : The MIT Press
    ISBN: 9780262525503
    Language: English
    Pages: XI, 178 S. , Ill.
    Series Statement: Cultural studies
    Series Statement: Technology
    Series Statement: Architecture
    DDC: 601
    RVK:
    RVK:
    Keywords: Technology Philosophy ; Interfaces (Physical sciences) ; Human-machine systems Philosophy ; Mensch-Maschine-Kommunikation ; Schnittstelle
    Description / Table of Contents: The subject of the interfaceThe interface as form of relation -- Between faces and facing between -- The interface and the surface -- Toward a theory of the interface -- Janus and Jupiter -- Control and power -- The interface and the apparatus -- The interface and the game -- The interface and the machine -- Separation and augmentation -- Mimicry in the game and the interface -- The forming of the interface -- The interface as that which defines the fluid -- Turbulence and control -- The exacting of turbulence -- The demons on the threshold -- Theories of the vortex -- Information and entropy -- Governance and reciprocity -- The interface and teleology -- The turbine as superimposition of fluid and machine -- The vertiginous moment of interface -- The augmentation of the interface -- A genius of augmentation -- The tacit knowing of the interface -- Singularity -- Symbiosis -- System -- Positioning.
    Note: Includes bibliographical references and index , Erscheinungsjahr in Vorlageform:[2014]
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Language: English
    Pages: 1 online resource (xxvi, 716 p.) , ill.
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: Malware (Computer software) ; Computer security ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg
    ISBN: 9783642175251
    Language: English
    Pages: Online-Ressource (X, 294p. 60 illus, digital)
    Series Statement: Theory and Applications of Natural Language Processing
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. Interactive multi-modal question-answering
    RVK:
    Keywords: Information storage and retrieval systems ; Computer Science ; Computer science ; Multimedia systems ; Information storage and retrieva ; Computer science ; Information storage and retrieval systems ; Multimedia systems ; Aufsatzsammlung ; Frage-Antwort-System ; Multimodales System ; Mensch-Maschine-Kommunikation ; Natürlichsprachiges System ; Medizin ; Dialogsystem ; Information Extraction ; Textanalyse
    Abstract: Part I Introduction to the IMIX Programme -- Introduction. Antal van den Bosch and Gosse Bouma -- IMIX: Good Questions, Promising Answers. Eduard Hovy, Jon Oberlander, and Norbert Reithinger -- The IMIX demonstrator: an information search assistant for the medical domain. Dennis Hofs and Boris van Schooten and Rieks op den Akker -- Part II Interaction Management -- Vidiam: Corpus-based Development of a Dialogue Manager for Multimodal Question Answering. Boris van Schooten and Rieks op den Akker -- Multidimensional Dialogue Management. Simon Keizer, Harry Bunt, and Volha Petukhova -- Part III Fusing Text, Speech, and Images. Experiments in Multimodal Information Presentation. Charlotte van Hooijdonk, Wauter Bosma, Emiel Krahmer, Alfons Maes, and Mariët Theune -- Text-to-text generation for question answering. Wauter Bosma, Erwin Marsi, Emiel Krahmer and Mariët Theune -- Part IV Text Analysis for Question Answering Automatic Extraction of Medical Term Variants from Mutilingual Parallel Translations. Lonneke van der Plas, Jörg Tiedemann, and Ismail Fahmi -- Relation Extraction for Open and Closed Domain Question Answering . Gosse Bouma, Ismail Fahmi, and Jori Mur -- Constraint-Satisfaction Inference for Entity Recognition. Sander Canisius, Antal van den Bosch, and Walter Daelemans -- Extraction of Hypernymy Information from Text. Erik Tjong Kim Sang, Katja Hofmann and Maarten de Rijke.-Towards a Discourse-driven Taxonomic Inference Model . Piroska Lendvai
    Abstract: This book is the result of a group of researchers from different disciplines asking themselves one question: what does it take to develop a computer interface that listens, talks, and can answer questions in a domain? First, obviously, it takes specialized modules for speech recognition and synthesis, human interaction management (dialogue, input fusion, andmultimodal output fusion), basic question understanding, and answer finding. While all modules are researched as independent subfields, this book describes the development of state-of-the-art modules and their integration into a single, working application capable of answering medical (encyclopedic) questions such as "How long is a person with measles contagious?" or "How can I prevent RSI?". The contributions in this book, which grew out of the IMIX project funded by the Netherlands Organisation for Scientific Research, document the development of this system, but also address more general issues in natural language processing, such as the development of multidimensional dialogue systems, the acquisition of taxonomic knowledge from text, answer fusion, sequence processing for domain-specific entity recognition, and syntactic parsing for question answering. Together, they offer an overview of the most important findings and lessons learned in the scope of the IMIX project, making the book of interest to both academic and commercial developers of human-machine interaction systems in Dutch or any other language. Highlights include: integrating multi-modal input fusion in dialogue management (Van Schooten and Op den Akker), state-of-the-art approaches to the extraction of term variants (Van der Plas, Tiedemann, and Fahmi; Tjong Kim Sang, Hofmann, and De Rijke), and multi-modal answer fusion (two chapters by Van Hooijdonk, Bosma, Krahmer, Maes, Theune, and Marsi). Watch the IMIX movie at www.nwo.nl/imix-film . Like IBM's Watson, the IMIX system described in the book gives naturally phrased responses to naturally posed questions. Where Watson can only generate synthetic speech, the IMIX system also recognizes speech. On the other hand, Watson is able to win a television quiz, while the IMIX system is domain-specific, answering only to medical questions. "The Netherlands has always been one of the leaders in the general field of Human Language Technology, and IMIX is no exception. It was a very ambitious program, with a remarkably successful performance leading to interesting results. The teams covered a rema ...
    Description / Table of Contents: pt. 1. Introduction to the IMIX programme -- pt. 2. Interaction management -- pt. 3. Fusing text, speech, and images -- pt. 4. Text analysis for question answering -- pt. 5. Epilogue.
    Note: Includes bibliographical references
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9783642249426
    Language: English
    Pages: Online-Ressource (XV, 253p. 50 illus., 27 illus. in color, digital)
    Series Statement: Theory and Applications of Natural Language Processing
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. Rieser, Verena Reinforcement learning for adaptive dialogue systems
    RVK:
    Keywords: Computer Science ; Computer science ; Artificial intelligence ; Translators (Computer programs) ; Computer science ; Artificial intelligence ; Translators (Computer programs) ; Mensch-Maschine-Kommunikation ; Dialogsystem ; Natürlichsprachiges System ; Multimodales System ; Lernendes System ; Bestärkendes Lernen ; Benutzerverhalten ; Simulation ; Automatische Sprachproduktion ; Mensch-Maschine-Kommunikation ; Dialogsystem ; Natürlichsprachiges System ; Multimodales System ; Lernendes System ; Bestärkendes Lernen ; Benutzerverhalten ; Simulation ; Automatische Sprachproduktion
    Abstract: 1.Introduction -- 2.Background -- 3.Reinforcement Learning for Information Seeking dialogue strategies -- 4.The bootstrapping approach to developing Reinforcement Learning-based strategies -- 5.Data Collection in aWizard-of-Oz experiment -- 6.Building a simulated learning environment from Wizard-of-Oz data -- 7.Comparing Reinforcement and Supervised Learning of dialogue policies with real users -- 8.Meta-evaluation -- 9.Adaptive Natural Language Generation -- 10.Conclusion -- References -- Example Dialogues -- A.1.Wizard-of-Oz Example Dialogues -- A.2.Example Dialogues from Simulated Interaction -- A.3.Example Dialogues from User Testing -- Learned State-Action Mappings -- Index
    Abstract: The past decade has seen a revolution in the field of spoken dialogue systems. As in other areas of Computer Science and Artificial Intelligence, data-driven methods are now being used to drive new methodologies for system development and evaluation. This book is a unique contribution to that ongoing change. A new methodology for developing spoken dialogue systems is described in detail. The journey starts and ends with human behaviour in interaction, and explores methods for learning from the data, for building simulation environments for training and testing systems, and for evaluating the results. The detailed material covers: Spoken and Multimodal dialogue systems, Wizard-of-Oz data collection, User Simulation methods, Reinforcement Learning, and Evaluation methodologies. The book is a research guide for students and researchers with a background in Computer Science, AI, or Machine Learning. It navigates through a detailed case study in data-driven methods for development and evaluation of spoken dialogue systems. Common challenges associated with this approach are discussed and example solutions are provided. This work provides insights, lessons, and inspiration for future research and development - not only for spoken dialogue systems in particular, but for data-driven approaches to human-machine interaction in general
    Description / Table of Contents: Reinforcement Learning for Adaptive Dialogue Systems; Preface; Acknowledgements; Contents; Acronyms; Chapter 1 Introduction; 1.1 The Design Problem for Spoken Dialogue Systems; 1.2 Overview; 1.3 Structure of the Book; Chapter 2 (Background); Chapter 3 (Reinforcement Learning); Chapter 4 (Proof-of-Concept: Information Seeking Strategies); Chapter 5 (A Bootstrapping Approach to Develop Reinforcement Learning-based Strategies); Chapter 6 (Data Collection in aWizard-of-Oz Experiment); Chapter 7 (Building a Simulated Learning Environment from Wizard-of-Oz Data)
    Description / Table of Contents: Chapter 8 (Comparing Reinforcement and Supervised Learning of Dialogue Policies with Real Users)Chapter 9 (Natural Language Generation); Chapter 10 (Conclusion); Part I Fundamental Concepts; Chapter 2 Background; 2.1 Human-Computer Interaction; 2.2 Dialogue Strategy Development; 2.2.1 Conventional Development Lifecycle; 2.2.2 Evaluation and Strategy Quality Control; 2.2.2.1 Quality Control in Industry; 2.2.2.2 Evaluation Practises in Academia; 2.2.2.3 The PARADISE Evaluation Framework; 2.2.2.4 Strategy Re-Implementation; 2.2.3 Strategy Implementation
    Description / Table of Contents: 2.2.3.1 Implementation Practises in Industry2.2.3.2 Implementation Practises in Academia; 2.2.4 Challenges for Strategy Development; 2.3 Literature review: Learning Dialogue Strategies; 2.3.1 Machine Learning Paradigms; 2.3.2 Supervised Learning for Dialogue Strategies; 2.3.3 Dialogue as Decision Making under Uncertainty; 2.3.4 Reinforcement Learning for Dialogue Strategies; 2.4 Summary; Chapter 3 Reinforcement Learning; 3.1 The Nature of Dialogue Interaction; 3.1.1 Dialogue is Temporal; 3.1.2 Dialogue is Dynamic; 3.2 Reinforcement Learning-based Dialogue Strategy Learning
    Description / Table of Contents: 3.2.1 Dialogue as a Markov Decision Process3.2.1.1 Representing Dialogue as a Markov Decision Process; 3.2.1.2 Partially Observable Markov Decision Processes for Strategy Learning; 3.2.2 The Reinforcement Learning Problem; 3.2.2.1 Elements of Reinforcement Learning; 3.2.2.2 Algorithms for Reinforcement Learning; 3.2.2.3 The Curse of Dimensionality, and State Space Reduction; 3.2.3 Model-based vs. Simulation-based Strategy Learning; 3.2.3.1 Model-based Reinforcement Learning; 3.2.3.2 Simulation-based Reinforcement Learning; 3.3 Dialogue Simulation; 3.3.1 Wizard-of-Oz Studies
    Description / Table of Contents: 3.3.2 Computer-based Simulations3.3.3 Discussion; 3.4 Application Domains; 3.4.1 Information-Seeking Dialogue Systems; 3.4.2 Multimodal Output Planning and Information Presentation; 3.4.3 Multimodal Dialogue Systems for In-Car Digital Music Players; 3.5 Summary; Chapter 4 Proof-of-Concept: Information Seeking Strategies; 4.1 Introduction; 4.1.1 A Proof-of-Concept Study; 4.2 Simulated Learning Environments; 4.2.1 Problem Representation; 4.2.2 Database Retrieval Simulations; 4.2.2.1 Monotonic Database Simulation; 4.2.2.2 Random Database Simulation; 4.2.3 Noise Model; 4.2.4 User Simulations
    Description / Table of Contents: 4.2.5 Objective and Reward Function
    Note: Description based upon print version of record
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Language: English
    Pages: 1 online resource (xxvi, 358 p.) , ill.
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    RVK:
    RVK:
    Keywords: Cloud computing ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support"--Resource description page.
    Note: Description based on print version record. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    ISBN: 9780080558264 , 0080558267
    Language: English
    Pages: 1 Online-Ressource (xvii, 317 Seiten) , Diagramme
    Series Statement: Morgan Kaufmann series in interactive technologies
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 303.48/34
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: COMPUTERS / Social Aspects / General ; User interfaces (Computer systems) ; User interfaces (Computer systems) / Measurement ; Measurement ; Technology assessment ; User interfaces (Computer systems) ; User interfaces (Computer systems) Measurement ; Measurement ; Technology assessment ; Mensch-Maschine-Schnittstelle ; Datenerhebung ; Bewertung ; Benutzerfreundlichkeit ; Mensch-Maschine-Kommunikation ; Mensch-Maschine-Kommunikation ; Benutzerfreundlichkeit ; Bewertung ; Datenerhebung ; Mensch-Maschine-Schnittstelle ; Benutzerfreundlichkeit ; Bewertung ; Datenerhebung
    Note: Effectively measuring the usability of any product requires choosing the right metric, applying it, and effectively using the information it reveals. Measuring the User Experience provides the first single source of practical information to enable usability professionals and product developers to do just that. Authors Tullis and Albert organize dozens of metrics into six categories: performance, issues-based, self-reported, web navigation, derived, and behavioral/physiological. They explore each metric, considering best methods for collecting, analyzing, and presenting the data. They provide step-by-step guidance for measuring the usability of any type of product using any type of technology. . Presents criteria for selecting the most appropriate metric for every case. Takes a product and technology neutral approach . Presents in-depth case studies to show how organizations have successfully used the metrics and the information they revealed , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Amsterdam : Elsevier/Morgan Kaufmann
    ISBN: 9780080555881 , 0080555888
    Language: English
    Pages: 1 online resource (xxxvii, 537 pages) , illustrations
    Series Statement: Morgan Kaufmann series in networking
    Series Statement: Morgan Kaufmann series in computer security
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer networks / Security measures ; Computer networks / Reliability ; Computer security ; Computer networks / Reliability ; Computer networks / Security measures ; Computer security ; Security measures ; Reliability ; Computer networks / Security measures ; Computer security ; Computer networks / Reliability ; Computer networks / Security measures ; Computer networks / Reliability ; Computer networks ; Computer networks Security measures ; Computer networks Reliability ; Computer security ; Computersicherheit ; Rechnernetz ; Zuverlässigkeit ; Rechnernetz ; Zuverlässigkeit ; Computersicherheit
    Abstract: In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks
    Abstract: Printbegrænsninger: Der kan printes kapitelvis
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Indianapolis, Ind. : Wiley Pub.
    Language: English
    Pages: 1 online resource (xl, 1040 p.) , ill.
    Edition: 2nd ed.
    Parallel Title: Erscheint auch als
    DDC: 005.1
    RVK:
    RVK:
    RVK:
    Keywords: Computer security ; Electronic data processing ; Distributed processing ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
    Note: Cover title. - Includes bibliographical references (p. 893-996) and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    ISBN: 9781402030758
    Language: English
    Pages: Online-Ressource (XXVIII, 403 p, digital)
    Edition: Springer eBook Collection. Humanities, Social Science and Law
    Series Statement: Text, Speech and Language Technology 28
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. Spoken multimodal human-computer dialogue in mobile environments
    RVK:
    RVK:
    Keywords: Linguistics ; Multimedia systems ; Computer science ; Translators (Computer programs) ; Computational linguistics ; Aufsatzsammlung ; Mensch ; Computer ; Dialog ; Mensch-Maschine-Kommunikation ; Mobile Computing
    Abstract: Issues in Multimodal Spoken Dialogue Systems and Components -- Multimodal Dialogue Systems -- Speech Recognition Technology in Multimodal/Ubiquitous Computing Environments -- A Robust Multimodal Speech Recognition Method using Optical Flow Analysis -- Feature Functions for Tree-Based Dialogue Course Management -- A Reasoning Component for Information-Seeking and Planning Dialogues -- A Model for Multimodal Dialogue System Output Applied to an Animated Talking Head -- System Architecture and Example Implemesntations -- Overview of System Architecture -- XISL: A Modality-Independent MMI Description Language -- A Path to Multimodal Data Services for Telecommunications -- Multimodal Spoken Dialogue with Wireless Devices -- The Smartkom Mobile Car Prototype System for Flexible Human-Machine Communication -- LARRI: A Language-Based Maintenance and Repair Assistant -- Evaluation and Usability -- Overview of Evaluation and Usability -- Evaluating Dialogue Strategies in Multimodal Dialogue Systems -- Enhancing the Usability of Multimodal Virtual Co-drivers -- Design, Implementation and Evaluation of the SENECA Spoken Language Dialogue System -- Segmenting Route Descriptions for Mobile Devices -- Effects of Prolonged Use on the Usability of a Multimodal Form-Filling Interface -- User Multitasking with Mobile Multimodal Systems -- Speech Convergence with Animated Personas
    Abstract: This book is based on publications from the ISCA Tutorial and Research Workshop on Multi-Modal Dialogue in Mobile Environments held at Kloster Irsee, Germany, in 2002. The workshop covered various aspects of devel- ment and evaluation of spoken multimodal dialogue systems and components with particular emphasis on mobile environments, and discussed the state-- the-art within this area. On the development side the major aspects addressed include speech recognition, dialogue management, multimodal output gene- tion, system architectures, full applications, and user interface issues. On the evaluation side primarily usability evaluation was addressed. A number of high quality papers from the workshop were selected to form the basis of this book. The volume is divided into three major parts which group together the ov- all aspects covered by the workshop. The selected papers have all been - tended, reviewed and improved after the workshop to form the backbone of the book. In addition, we have supplemented each of the three parts by an invited contribution intended to serve as an overview chapter
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    San Francisco, Calif. : Morgan Kaufmann Publishers
    ISBN: 9781429484541 , 1429484543 , 9780080497563 , 008049756X
    Language: English
    Pages: 1 online resource (xvi, 560 pages) , illustrations
    Series Statement: Morgan Kaufmann series in interactive technologies
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 004/.01/9
    RVK:
    RVK:
    Keywords: Interaction homme-machine (Informatique) ; Interfaces utilisateurs (Informatique) ; COMPUTERS / Interactive & Multimedia ; COMPUTERS / Social Aspects / Human-Computer Interaction ; Human-computer interaction ; User interfaces (Computer systems) ; Computadores (ciências da computação) ; Homens (interação) ; Human-computer interaction ; User interfaces (Computer systems) ; Mensch-Maschine-Kommunikation ; Benutzerforschung ; Ergonomie ; Produktgestaltung ; Verbraucherforschung ; Industriedesign ; Produktgestaltung ; Ergonomie ; Industriedesign ; Verbraucherforschung ; Mensch-Maschine-Kommunikation ; Benutzerforschung
    Abstract: The gap between who designers and developers imagine their users are, and who those users really are can be the biggest problem with product development. Observing the User Experience will help you bridge that gap to understand what your users want and need from your product, and whether they'll be able to use what you've created. Filled with real-world experience and a wealth of practical information, this book presents a complete toolbox of techniques to help designers and developers see through the eyes of their users. It provides in-depth coverage of 13 user experience research techniques
    Note: Title from title screen , Includes bibliographical references and index. - Title from website (viewed Jan. 20, 2006)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...