Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (33)
  • Ethn. Museum Berlin  (3)
  • Computersicherheit  (19)
  • Konferenzschrift
  • Web site development
  • Computer Science  (36)
Datasource
Material
Language
  • 1
    Language: English
    Pages: 1 online resource (450 pages) , illustrations.
    Series Statement: The pragmatic programmers
    Parallel Title: Erscheint auch als Ruby, Sam Agile web development with Rails 7
    DDC: 005.13/3
    RVK:
    Keywords: Ruby on rails (Electronic resource) ; Web site development ; Application software Development ; Agile software development ; Ruby (Computer program language) ; Object-oriented programming (Computer science) ; Ruby on Rails 5.1 ; Agile Softwareentwicklung ; Ruby ; Ruby on Rails 5.1
    Abstract: Rails 7 completely redefines what it means to produce fantastic user experiences and provides a way to achieve all the benefits of single-page applications - at a fraction of the complexity. Rails 7 integrates the Hotwire frameworks of Stimulus and Turbo directly as the new defaults, together with that hot newness of import maps. The result is a toolkit so powerful that it allows a single individual to create modern applications upon which they can build a competitive business. The way it used to be. This book helps you produce high-quality, beautiful-looking web applications quickly - you concentrate on creating the application, and Rails takes care of the details. Rails 7 brings many improvements, and this edition is updated to cover the new features and changes in best practices.
    Note: Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9783748927679
    Language: German
    Pages: 1 Online-Ressource (156 Seiten)
    Edition: 1. Auflage
    Series Statement: Schriften zum IT-Sicherheitsrecht Band 2
    Parallel Title: Erscheint auch als Cybersecurity als Unternehmensleitungsaufgabe
    DDC: 346.43065
    RVK:
    RVK:
    Keywords: Aufsatzsammlung ; Deutschland ; Unternehmensleitung ; Computersicherheit ; Risikomanagement ; Compliance-System ; Haftung ; China ; Unternehmensleitung ; Computersicherheit ; Compliance-System ; Datenschutz ; Deutschland ; Unternehmensleitung ; Computersicherheit ; Risikomanagement ; Compliance-System ; Haftung ; China ; Unternehmensleitung ; Computersicherheit ; Compliance-System ; Datenschutz
    Note: Enthält 7 Beiträge
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Wiley | Boston, MA : Safari
    ISBN: 9781119710745
    Language: English
    Pages: 1 online resource (320 pages)
    Edition: 1st edition
    RVK:
    RVK:
    RVK:
    Keywords: Kraftfahrzeugindustrie ; Kraftfahrzeug ; Softwareentwicklung ; Computersicherheit
    Abstract: BUILDING SECURE CARS Explores how the automotive industry can address the increased risks of cyberattacks and incorporate security into the software development lifecycle While increased connectivity and advanced software-based automotive systems provide tremendous benefits and improved user experiences, they also make the modern vehicle highly susceptible to cybersecurity attacks. In response, the automotive industry is investing heavily in establishing cybersecurity engineering processes. Written by a seasoned automotive security expert with abundant international industry expertise, Building Secure Cars: Assuring the Automotive Software Development Lifecycle introduces readers to various types of cybersecurity activities, measures, and solutions that can be applied at each stage in the typical automotive development process. This book aims to assist auto industry insiders build more secure cars by incorporating key security measures into their software development lifecycle. Readers will learn to better understand common problems and pitfalls in the development process that lead to security vulnerabilities. To overcome such challenges, this book details how to apply and optimize various automated solutions, which allow software development and test teams to identify and fix vulnerabilities in their products quickly and efficiently. This book balances technical solutions with automotive technologies, making implementation practical. Building Secure Cars is: One of the first books to explain how the automotive industry can address the increased risks of cyberattacks, and how to incorporate security into the software development lifecycle An optimal resource to help improve software security with relevant organizational workflows and technical solutions A complete guide that covers introductory information to more advanced and practical topics Written by an established professional working at the heart of the automotive industry Fully illustrated with tables and visuals, plus real-life problems and suggested solutions to enhance the learning experience This book is written for software development process owners, security policy owners, software developers and engineers, and cybersecurity teams in the automotive industry. All readers will be empowered to improve their organizations’ security postures by understanding and applying the practical technologies and solutions inside.
    Note: Online resource; Title from title page (viewed March 22, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Oxford : Oxford University Press
    ISBN: 9780191840166
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Oxford handbooks online
    Series Statement: Political Science
    Parallel Title: Erscheint auch als The Oxford handbook of cyber security
    DDC: 005.8
    RVK:
    Keywords: Computer security ; Computer networks Security measures ; Computersicherheit ; Cyberattacke ; Computerkriminalität ; Sicherheitspolitik
    Abstract: 'The Oxford Handbook of Cyber Security' presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, amd national level.
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9783658223335
    Language: German , English
    Pages: 1 Online-Ressource (VIII, 207 Seiten) , Illustrationen, Diagramme
    Parallel Title: Erscheint auch als
    DDC: 306.36
    RVK:
    RVK:
    Keywords: Sociology of Work ; Organizational Studies, Economic Sociology ; Knowledge - Discourse ; Industrial sociology ; Economic sociology ; Sociology ; Industrie 4.0 ; Digitalisierung ; Wissenssoziologie ; Wirtschaft ; Informationsgesellschaft ; Wirtschaftssoziologie ; Digitale Revolution ; Aufsatzsammlung ; Konferenzschrift 2017 ; Aufsatzsammlung ; Konferenzschrift 2017 ; Konferenzschrift ; Aufsatzsammlung ; Konferenzschrift 2017 ; Aufsatzsammlung ; Konferenzschrift 2017 ; Konferenzschrift ; Wissenssoziologie ; Digitalisierung ; Industrie 4.0 ; Wirtschaftssoziologie ; Wirtschaft ; Digitale Revolution ; Informationsgesellschaft ; Industrie 4.0 ; Wirtschaftssoziologie
    Note: "Die Beiträge sind zum Teil das Resultat der Tagung "Meilensteine und Perspektiven der wissensbasierten Wirtschaft", die von den Herausgebern organisiert wurde und die am 14. und 15. September 2017 an der Technischen Universität Chemnitz stattfand." - Einleitung , Beiträge überwiegend deutsch, teilweise englisch
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 978-3-662-57765-3
    Language: German
    Pages: 1 Online-Ressource (IX, 114 Seiten) : , Illustrationen, Diagramme.
    Series Statement: Schriften zu Gesundheit und Gesellschaft - Studies on Health and Society Band 2
    Series Statement: Schriften zu Gesundheit und Gesellschaft - Studies on Health and Society
    Parallel Title: Erscheint auch als
    DDC: 344.0321
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Medical Law ; Artificial Intelligence ; Philosophy of Technology ; Ethics ; Organizational Studies, Economic Sociology ; Nursing Management ; Public health laws ; Artificial intelligence ; Philosophy ; Ethics ; Nursing ; Künstliche Intelligenz. ; Roboter. ; Ethik. ; Lernendes System. ; Verantwortung. ; Autonomer Roboter. ; Serviceroboter. ; Gesellschaft. ; Arbeitswelt. ; Konferenzschrift 24.11.2015 ; Konferenzschrift ; Künstliche Intelligenz ; Roboter ; Ethik ; Roboter ; Lernendes System ; Verantwortung ; Ethik ; Autonomer Roboter ; Serviceroboter ; Gesellschaft ; Arbeitswelt
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Wiesbaden : Springer VS
    ISBN: 9783658261504
    Language: German
    Pages: 1 Online-Ressource (XII, 162 Seiten) , Illustrationen
    Parallel Title: Erscheint auch als
    DDC: 306.42
    RVK:
    RVK:
    Keywords: Knowledge - Discourse ; Cybercrime ; Computer crimes ; Computersicherheit ; Internetkriminalität ; Einführung ; Lehrbuch ; Einführung ; Lehrbuch ; Einführung ; Lehrbuch ; Internetkriminalität ; Computersicherheit
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9781788838214 , 1788838211
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition
    Parallel Title: Erscheint auch als
    RVK:
    Keywords: Bootstrap (Computer program) ; Web sites Design ; Web site development ; Bootstrap ; Bootstrap
    Note: Description based on online resource; title from title page (Safari, viewed March 9, 2018)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Language: German
    Pages: 1 Online-Ressource (245 Seiten) , Illustrationen, Diagramme
    Parallel Title: Erscheint auch als CASE | KRITIS
    DDC: 363.10028558
    RVK:
    Keywords: Datensicherheit ; Krisenmanagement ; Infrastruktur ; Unternehmen ; Öffentliche Verwaltung ; Deutschland ; Datensicherheit ; Krisenmanagement ; Infrastruktur ; Unternehmen ; Öffentliche Verwaltung ; Deutschland ; Datensicherheit ; Deutschland ; Infrastruktur ; Krisenmanagement ; Unternehmen ; Öffentliche Verwaltung ; Fallstudie ; Fallstudiensammlung ; Deutschland ; Kritische Infrastruktur ; Computersicherheit ; Informationsmanagement ; Erfolgsfaktor ; Deutschland ; Kritische Infrastruktur ; Computersicherheit ; Krisenmanagement
    Note: Förderkennzeichen BMBF16 KIS 0213 K-16 KIS 0216 K. - Verbund-Nummer 01157786 , Enthält 17 Beiträge , Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : mitp Verlag | Boston, MA : Safari
    ISBN: 9783958452756
    Language: English , German
    Pages: 1 online resource (520 pages)
    Edition: 2nd edition
    Parallel Title: Erscheint auch als Harich, Thomas W. IT-Sicherheitsmanagement
    DDC: 005.80218
    RVK:
    RVK:
    Keywords: Electronic books ; local ; BSI ; ISMS ; ISO-27001 ; IT-System ; Compliance ; Monitoring ; Sicherheit ; Controlling ; Datenschutz ; Richtlinien ; DIN-NIA-01-27 ; IT-Compliance ; IT-Sicherheit ; Risikofaktoren ; Cloud Computing ; Datensicherheit ; Risikobewertung ; Datenschutzrecht ; Penetrationstest ; Softwareprojekte ; Geschäftsprozesse ; Notfallmanagement ; digitale Signatur ; Balanced Scorecard ; IT-Risikomanagement ; Softwareentwicklung ; Identitätsmanagement ; Informationssicherheit ; Business Impact-Analyse ; IT-Sicherheitsverfahren ; Risikomanagementprozess ; IT-Sicherheitsmanagement ; ISO/IEC 27001 ; Europäische Union Datenschutz-Grundverordnung ; Computersicherheit ; Rechnernetz ; Systemverwaltung ; Datensicherung ; Computersicherheit
    Abstract: Praxiswissen für IT Security Manager Mit einem durchdachten IT-Sicherheitskonzept zu mehr Informationssicherheit IT Compliance, Business Continuity Management, Risikomanagement oder Security Audit – alle Bereiche des IT Security Managers praxisnah erklärt Aufbau eines Information Security Management Systems (ISMS) nach ISO 27001 und BSI – unter Berücksichtigung der neuen DSGVO Immer mehr Daten werden in Public Clouds verarbeitet, auf Mobiltelefonen gespeichert, über Chat-Apps geteilt oder im Rahmen von Industrie 4.0 in einer Größenordnung erhoben, die bislang kaum denkbar war. Die entsprechenden Maßnahmen der IT-Security müssen sich an diese Veränderungen anpassen. Ebenso wie an die EU-Datenschutz-Grundverordnung, das IT-Sicherheitsgesetz oder das China Cybersecurity Law. Alle diese Regelungen haben immense Auswirkungen darauf, wie Unternehmen Daten erfassen, verarbeiten, speichern oder austauschen dürfen. In der Fülle und der Bandbreite der neuen Regelungen liegt aber immer auch die Gefahr, etwas falsch zu machen. Dieser Praxisleitfaden wird Ihnen dabei helfen, von der schieren Menge an Einzelthemen und Aufgaben, mit denen sich der (angehende) IT Security Manager auseinanderzusetzen hat, nicht erschlagen zu werden und den richtigen Weg zu wählen, um mit all diesen Anforderungen umzugehen. Jedes Kapitel dieses Buches beschreibt einen zusammenhängenden Bereich der IT Security. Die notwendige theoretische Fundierung wechselt sich dabei ab mit Tipps aus der Praxis für die Praxis, mit für den Berufsalltag typischen Fragestellungen, vielen konkreten Beispielen und hilfreichen Checklisten. Alle Teilgebiete werden abschließend in einem Kapitel zusammengeführt, das die Einführung und Weiterentwicklung eines IT-Sicherheitsmanagements auf Basis der ISO-27000-Normen-Familie unter Beachtung der datenschutzrechtlichen Bestimmungen der EU-DSGVO behandelt. So erhalten Sie sowohl einen kompetenten Praxisleitfaden (auch für den Berufseinstieg) als auch ein umfassendes Nachschlagewerk für Ihre tägliche Arbeit. Aus dem Inhalt: Umfang und Aufgabe des IT-Security-Managements Organisation der IT-Security IT-Compliance Organisation von Richtlinien Betrieb der IT-Security IT Business Continuity Management IT-Notfallmanagement Verfügbarkeitsmanagement Technische IT-Security IT-Risikomanagement Sicherheitsmonitoring IT-Security-Audit Management von Sicherheitsereignissen und IT-Forensik Kennzahlen Praxis: Aufbau eines ISMS Awareness und Schulung Über den Autor: T...
    Note: Online resource; Title from title page (viewed June 26, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Cambridge, MA : Syngress, an imprint of Elsevier
    ISBN: 9780128045053 , 0128045051 , 0128044586 , 9780128044582
    Language: English
    Pages: 1 online resource (144 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 004.67/8
    RVK:
    RVK:
    Keywords: COMPUTERS / Computer Literacy ; COMPUTERS / Computer Science ; COMPUTERS / Data Processing ; COMPUTERS / Hardware / General ; COMPUTERS / Information Technology ; COMPUTERS / Machine Theory ; COMPUTERS / Reference ; Computer networks / Security measures ; Computer security ; Internet of things ; Internet of things ; Computer networks Security measures ; Computer security ; Internet der Dinge ; Computersicherheit ; Internet der Dinge ; Computersicherheit
    Abstract: "Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780128038383 , 0128038381
    Language: English
    Pages: 1 online resource (273 pages) , illustrations
    Series Statement: Syngress advanced topics in information security
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    RVK:
    Keywords: COMPUTERS / Security / General ; Computer networks / Security measures ; Computer security ; Cyber intelligence (Computer security) ; Computer security ; Computer networks Security measures ; Cyber intelligence (Computer security) ; Informationssystem ; Unternehmen ; Datensicherung ; Computersicherheit ; Rechnernetz ; Rechnernetz ; Computersicherheit ; Datensicherung ; Unternehmen ; Datensicherung ; Informationssystem
    Abstract: "Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic.
    Abstract: The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system's performance.
    Abstract: Presents the most current and leading edge research on system safety and security, featuring a panel of top experts in the field Includes several research advancements published for the first time, including the use of 'goal structured notation' together with a 'judgment calculus' and their automation as a 'rule set' to facilitate systems safety and systems security process execution in compliance with existing standards Presents for the first time the latest research in the field with the unique perspective that systems safety and systems security are inextricably intertwined Includes coverage of systems architecture, cyber physical systems, tradeoffs between safety, security, and performance, as well as the current methodologies and technologies and implantation practices for system safety and security"--Provided by publisher
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Cambridge, MA : Syngress is an imprint of Elsevier
    ISBN: 9780128004784 , 0128004789 , 0128000066 , 9780128000069
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Security / Networking ; Big data ; Computer security ; Computer security ; Big data ; Computersicherheit ; Bedrohung ; Big Data ; Prognose ; Computersicherheit ; Big Data ; Bedrohung ; Prognose
    Abstract: This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools
    Note: Includes index , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9781137400529
    Language: English
    Pages: 1 Online-Ressource (XIII, 222 Seiten)
    Edition: Springer eBook Collection. Political Science and International Studies
    Series Statement: New security challenges series
    Parallel Title: Erscheint auch als Christou, George, 1973 - Cybersecurity in the European Union
    DDC: 005.8
    RVK:
    RVK:
    Keywords: Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Außenpolitik ; Politische Wissenschaft ; Computersicherheit ; Europäische Union ; Internet ; Internetkriminalität ; Politik ; Sicherheit
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9789048524433
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Computer applications and quantitative methods in archaeology
    RVK:
    RVK:
    Keywords: Computermethoden ; Archaeological science, methodology & techniques ; Konferenzschrift ; Archäologie ; Methodologie ; Datenverarbeitung ; Quantitative Methode
    Abstract: This volume presents a selection of the best papers presented at the forty-first annual Conference on Computer Applications and Quantitative Methods in Archaeology. The theme for the conference was "Across Space and Time", and the papers explore a multitude of topics related to that concept, including databases, the semantic Web, geographical information systems, data collection and management, and more
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Waltham, MA : Syngress
    ISBN: 9780128010969 , 0128010967 , 0128008997 , 9780128008997
    Language: English
    Pages: 1 online resource (xvii, 262 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 363.28/9
    RVK:
    Keywords: HISTORY / Military / Other ; TECHNOLOGY & ENGINEERING / Military Science ; Computer security ; Private security services / Management ; Security systems / Management ; Computer Security ; Computer security ; Private security services Management ; Security systems Management ; Computersicherheit ; Unternehmen ; Unternehmen ; Computersicherheit
    Abstract: Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Organizations need to be committed to defending their own assets and their customers' information. This book will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. It explains how to develop and build a security operations center; shows how to gather invaluable intelligence to protect your organization; helps you evaluate the pros and cons behind each decision during the SOC-building process. --
    Note: Includes index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9780124201842 , 0124201849
    Language: English
    Pages: 1 online resource (xix, 439 pages) , illustrations
    Edition: Second edition
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 670.42/7
    RVK:
    Keywords: TECHNOLOGY & ENGINEERING / Industrial Engineering ; TECHNOLOGY & ENGINEERING / Industrial Technology ; TECHNOLOGY & ENGINEERING / Manufacturing ; TECHNOLOGY & ENGINEERING / Technical & Manufacturing Industries & Trades ; Computer security ; Corporate Network ; Computersicherheit ; Intelligentes Stromnetz ; SCADA / Programm ; Process control Security measures ; Computer security ; Intelligentes Stromnetz ; Computersicherheit ; SCADA ; Corporate Network ; Computersicherheit ; Corporate Network ; Intelligentes Stromnetz ; SCADA
    Abstract: Annotation
    Note: Previous edition: 2011 , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Amsterdam : Syngress, an imprint of Elsevier
    ISBN: 9780124166592 , 0124166598
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer crimes / Prevention ; Computer networks / Security measures ; Hackers ; Penetration testing (Computer security) ; Web sites / Security measures ; Web sites Security measures ; Web applications Security measures ; Computer networks Security measures ; Penetration testing (Computer security) ; Hackers ; Computer crimes Prevention ; World Wide Web ; Computersicherheit ; Rechnernetz ; Datensicherung ; Website ; World Wide Web ; Datensicherung ; Computersicherheit ; Website ; Computersicherheit ; Rechnernetz ; Computersicherheit
    Abstract: The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Book
    Book
    Wien [u.a.] : LIT
    ISBN: 9783643903457
    Language: English
    Pages: 150 S. , graph. Darst., Kt. , 24 cm
    Series Statement: Geosimulation 2
    Series Statement: Geosimulation
    DDC: 300.113
    RVK:
    RVK:
    Keywords: Kollektives Verhalten ; Raumverhalten ; Infrastruktur ; Computersimulation ; Mehragentensystem ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Konferenzschrift ; Aufsatzsammlung ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9789400751705 , 9781283865654
    Language: English
    Pages: Online-Ressource (XI, 440 p. 26 illus., 20 illus. in color)
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Sciences and Law Electronic reproduction; Available via World Wide Web
    DDC: 341
    RVK:
    Keywords: Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Computersicherheit
    Abstract: On 25 January 2012, the European Commission presented its long awaited new Data protection package. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media
    Abstract: On 25 January 2012, the European Commission presented its long awaited new “Data protection package”. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.
    Description / Table of Contents: European Data Protection:Coming of Age; Foreword; Contents; Part I: Concepts; Chapter 1: Seven Types of Privacy; 1.1 Introduction; 1.2 Defining and Conceptualising Privacy; 1.3 Seven Types of Privacy; 1.4 Privacy Impacts of New and Emerging Technologies; 1.4.1 Whole Body Imaging Scanners; 1.4.2 RFID-Enabled Travel Documents; 1.4.3 Unmanned Aircraft Systems; 1.4.4 Second-Generation DNA Sequencing Technologies; 1.4.5 Human Enhancement; 1.4.6 Second-Generation Biometrics; 1.4.7 Filling in the Gaps; 1.5 The Merit of Elusiveness; 1.6 Conclusion; References
    Description / Table of Contents: Chapter 2: The Internet as Surveilled Workplayplace and Factory2.1 Introduction; 2.2 Workplace Surveillance; 2.3 The Rise of Play Labour; 2.4 Internet Playbour; 2.5 Internet Surveillance; 2.6 Conclusion: The Surveilled Workplayplace Factory; References; Chapter 3: From Market-Making Tool to Fundamental Right: The Role of the Court of Justice in Data Protection's Identity Crisis; 3.1 Introduction; 3.2 A Critical Analysis of the 'Market-Making' Vocation of European Data Protection Law; 3.2.1 The Emergence of the Dual Objectives of European Data Protection Law
    Description / Table of Contents: 3.2.2 The Competence Question: The Legitimacy of EU Legislation in the Human Rights Sphere3.3 Loosening the Links Between Data Protection and Market Harmonisation?; 3.3.1 The Broad Conception of the Directive's Scope of Application; 3.3.2 The Margin of Discretion Left to National Authorities; 3.4 The Rights-Based Approach to Data Protection in the EU and the Residual Impact of Market Integration Restraints; 3.4.1 Data Protection as a Fundamental Right Pre-Lisbon; 3.4.2 The Right to Data Protection in the Post-Lisbon Era; 3.5 Conclusion: Casting Our Eyes on the Future; References
    Description / Table of Contents: Case Law of the Court of JusticeChapter 4: Anonymity: A Comparison Between the Legal and Computer Science Perspectives; 4.1 Introduction; 4.2 The Notion of Anonymity in European Legislation on Personal Data; 4.2.1 The Notion of Anonymity in Common Language; 4.2.2 The Definition of Personal Data; 4.2.3 The Concept of Anonymous Data; 4.2.4 A Case Study: The Definition of Anonymous Data in the Italian Personal Protection Code; 4.3 Anonymity in Data Disclosure; 4.3.1 Anonymity in Data Publication; 4.3.1.1 Problem Definition and Characterization; 4.3.1.2 k -Anonymity
    Description / Table of Contents: 4.3.1.3 k -Anonymity with Multiple QI4.3.1.4 l -Diversity; 4.3.1.5 t -Closeness; 4.3.2 Anonymity When Disclosing Spatio-Temporal Information; 4.3.2.1 Problem Description; 4.3.2.2 Privacy Models for LBS Anonymity; 4.4 Discussion; 4.4.1 The Role of Anonymity in Privacy Preservation; 4.4.2 Identifying Information and Personal Data; 4.4.3 Anonymity Measurement; 4.4.4 Anonymity and the Principle of Minimization; 4.5 Conclusions and Future Work; References; Part II: Digital Natives and Ageing Users
    Description / Table of Contents: Chapter 5: Digital Natives and the Metamorphosis of the European Information Society. The Emerging Behavioral Trends Regarding Privacy and Their Legal Implications
    Description / Table of Contents: Foreword -- I. Concepts -- 1. Seven types of privacy; Rachel Finn, David Wright and Michael Friedewald -- 2. The Internet as Surveilled Workplayplace and Factory; Christian Fuchs and Daniel Trottier -- 3. From Market-Making Tool to Fundamental Right: the Role of the Court of Justice in Data Protection’s Identity Crisis; Orla Lynskey -- 4. Anonymity: a Comparison between the Legal and Computer Science Perspectives; Sergio Mascetti, Anna Monreale, Annarita Ricci and Andrea Gerino -- II. Digital natives and ageing users -- 5. Digital Natives and the Metamorphosis of European Society. The emerging behavioral trends regarding privacy and their legal implications; Norberto Andrade and Shara Monteleone -- 6. Autonomy in ICT for older persons at the crossroads between legal and care practices; Daniel Lopez Gomez, Eugenio Mantovani and Paul De Hert -- 7. Ethical implications of technologies that "support" ageing with dementia at home; Unai Díaz-Orueta and Elena Urdaneta -- III. Privacy by design -- 8. Privacy by Design: Enhanced Privacy Leadership, Methods, and Results; Ann Cavoukian -- 9. Roadmap for Privacy Protection in Mobile Sensing Applications; Delphine Christin, Matthias Hollick -- 10. Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends; Maria Luisa Damiani -- 11. Privacy by Design through social requirements analysis of social network sites from a user perspective; Ralf De Wolf, Rob Heyman and Jo Pierson -- IV. Surveillance, profiling and smart metering -- 12. Smart metering and privacy in Europe: lessons from the Dutch case; Colette Cuijpers and Bert-Jaap Koops -- 13. User Choice, Privacy Sensitivity, and Acceptance of Personal Information Collection; Joshua B. Hurwitz -- 14. Beyond Gut Level - Some Critical Remarks on the German Privacy Approach to Smart Metering; Frank Pallas -- 15. Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposes; Martin Pekárek, Arnold Roosendaal and Jasper Sluijs -- 6. Computers Reading Our Minds? The benefits and risks of profiling; Jorg Polakiewicz -- Case studies -- 17. Communicating Privacy in Organisations. Catharsis and Change in the Case of the Deutsche Bahn; Daniel Guagnin, Carla Ilten and Leon Hempel -- 18. The end of independent data protection supervision in Hungary - a case study;  András Jóri -- 19. Data Protection, Social Networks and Online Mass Media; Artemi Rallo and Ricard Martínez..
    Note: Description based upon print version of record , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9789400729032
    Language: English
    Pages: Online-Ressource (XVIII, 363p. 20 illus., 10 illus. in color, digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. European Data Protection
    RVK:
    Keywords: Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Law ; Law ; Philosophy of law ; Technology Philosophy ; Computers Law and legislation ; Data protection--Law and legislation--European Union countries. ; Privacy, Right of--European Union countries. ; Europäische Union ; Computersicherheit ; Datenschutz
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 047057089X , 9780470570890
    Language: English
    Pages: 1 online resource (xxvi, 333 p.) , ill.
    Series Statement: Wrox guides
    Parallel Title: Erscheint auch als
    DDC: 006.78
    RVK:
    Keywords: Joomla! (Computer file) ; Web site development ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: Everything you need to know to plan and maintain a Joomla! site Joomla! offers powerful functionality and ease of configuration, making it an immensely popular open source content management system. However, far more than simply downloading and installing Joomla! is required in order to create a dynamic web site. This book walks you through the critical steps that must be taken in the planning process prior to establishing a Joomla! site. Joomla! expert Jen Kramer reviews essential questions that need to be asked of a client, discusses technical solutions to a variety of challenges, and explains how a site structure should be organized. Topics Covered: I Want a Web Site and I Want It Blue - How Much Will That Cost? Choosing the Right Technologies to Solve the Business Problem Downloading and Installing Joomla! A Brief Tour of the Joomla! Administration Interface Creating and Configuring Menus Installing and Configuring Modules That Come with Joomla Components That Come with Joomla! Plug-Ins That Come with Joomla! Adding Extensions to Joomla! Home Page Tips and Tricks Custom Templates Advanced Template and CSS Tricks Site Maintenance and Training Once the groundwork has been laid, you'll discover how to host and install Joomla!, and upgrade and maintain your Joomla! site. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
    Note: Includes index. - "Wrox programmer to programmer"--Cover. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Indianapolis, Ind. : Wiley Pub.
    Language: English
    Pages: 1 online resource (xii, 435 p.) , ill.
    Series Statement: Visual read less, learn more
    Parallel Title: Erscheint auch als
    DDC: 005.2762
    RVK:
    RVK:
    Keywords: Apache (Computer file : Apache Group) ; CGI (Computer network protocol) ; Perl (Computer program language) ; Web site development ; Electronic books ; local
    Abstract: Visually explore the range of built-in and third-party libraries of Perl and Apache Perl and Apache have been providing Common Gateway Interface (CGI) access to Web sites for 20 years and are constantly evolving to support the ever-changing demands of Internet users. With this book, you will heighten your knowledge and see how to usePerl and Apache to develop dynamic Web sites. Beginning with a clear, step-by-step explanation of how to install Perl and Apache on both Windows and Linux servers, you then move on to configuring each to securely provide CGI Services. CGI developer and author Adam McDaniel shows techniques for effectively developing and maintaining dynamic sites and he shares real-world examples describing MySQL database access, PayPal credit-card transactions, and sample Facebook and Twitter interfaces. Apache and Perl have been providing Common Gateway Interface (CGI) access to Internet Web sites for more than two decades, and both products are constantly evolving to support today's user requirements Shows how to install Perl and Apache on Windows and Linux servers and configure each to securely provide CGI services Details techniques for effectively developing and maintaining dynamic Web sites Addresses MySQL database access and PayPal credit-card transactions, and examines sample Facebook and Twitter interfaces With this book, you'll benefit from a wealth of techniques and resources that you won't find anywhere else.
    Note: Description based on print version record. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780080960944 , 0080960944 , 1282309250 , 9781282309258
    Language: English
    Pages: 1 online resource (xix, 504 pages)
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8068
    RVK:
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer networks / Security measures ; Computer networks / Testing ; Computer hackers ; Hackers ; Computer networks / Security measures ; Computer networks / Testing ; Computer networks / Security measures ; Computer networks / Testing ; Computer hackers ; Computer security Examinations ; Practice ; Rechnernetz ; Computersicherheit ; Penetrationstest ; Rechnernetz ; Computersicherheit ; Penetrationstest
    Abstract: Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price! Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers, digital piracy groups, and countless other organized or individual malicious hackers. The material presented will be useful to beginners all the way through to advanced practitioners. Find out how to turn hacking and pen testing skills into a professional career Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester Learn through video - the DVD includes instructional videos that replicate classroom instruction and live, real-world vulnerability simulations of complete servers with known and unknown vulnerabilities to practice hacking skills in a controlled lab environment
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    ISBN: 978-3-531-17327-6
    Language: German
    Pages: 596 S. : , Ill., graph. Darst.
    Edition: 2. Aufl.
    Series Statement: Netzwerkforschung [1]
    Series Statement: Netzwerkforschung
    DDC: 302.301
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Netzwerkanalyse ; Soziales Netzwerk. ; Theorie. ; Konferenzschrift 2007 ; Konferenzschrift 2007 ; Konferenzschrift 2007 ; Aufsatzsammlung ; Konferenzschrift ; Aufsatzsammlung ; Konferenzschrift ; Aufsatzsammlung ; Konferenzschrift 2007 ; Netzwerkanalyse ; Soziales Netzwerk ; Theorie
    Note: Fälschlich als Bd. 2 der Reihe bezeichnet
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Indianapolis, Ind. : Wiley
    Language: English
    Pages: 1 online resource (xxv, 255 p.) , ill.
    Series Statement: Wrox professional guides
    Parallel Title: Erscheint auch als
    DDC: 005.2762
    RVK:
    Keywords: PHP (Computer program language) ; Web site development ; Web sites ; Design ; Software patterns ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: This guide helps PHP developers take advantage of the stability and features of design patterns Design patterns are the cornerstones of building solid, stable, flexible, and feature-rich Web applications. This guide enables PHP developers to take advantage of everything they offer. If you are unfamiliar with design patterns, this book explains what you need to know. Both novice and veteran PHP developers will benefit from the alphabetical list of design patterns and code examples showing how to implement each pattern in PHP. Step-by-step instructions for a sample contact management system will help you understand real-world applications for the information. Gets PHP developers who have not used design patterns up to speed on the technology Shows programmers who are familiar with design patterns in other languages how to apply the techniques to PHP Includes examples of ordinary code used in everyday development and how to modify it for one of the design patterns discussed Provides an alphabetical list of common design patterns, with code examples showing how each can be implemented in PHP Uses a case study of a contact management system to analyze and demonstrate the step-by-step process of applying design patterns With its single focus on applying design patterns to PHP development, PHP Design Patterns helps both new and veteran PHP programmers improve their applications and their career prospects.
    Note: "Programmer to programmer"--Cover. - Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Indianapolis, IN : Wiley Pub.
    Language: English
    Pages: 1 online resource (xxxiv, 800 p.) , ill.
    Edition: 2nd ed.
    Series Statement: Wrox professional guides
    Parallel Title: Erscheint auch als
    DDC: 005.2/762
    RVK:
    Keywords: Web site development ; JavaScript (Computer program language) ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: This eagerly anticipated update to the breakout book on JavaScript offers you an in-depth look at the numerous advances to the techniques and technology of the JavaScript language. You'll see why JavaScript's popularity continues to grow while you delve through topics such as debugging tools in Microsoft Visual Studio, FireBug, and Drosera; client-side data storage with cookies, DOM storage, and client-side databases; HTML 5, ECMAScript 3.1, the Selectors API; and design patterns including creational, structural, and behavorial patterns.
    Note: "Wrox programmer to programmer"--Cover. - Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Indianapolis, IN : Wiley Pub.
    ISBN: 9780470386071 , 047038607X , 9780470189481
    Language: English
    Pages: 1 online resource (xxiii, 309 pages) , illustrations
    Series Statement: Wrox guides
    DDC: 005.1/17
    RVK:
    Keywords: Ruby on rails (Electronic resource) ; Ruby (Computer program language) ; Web site development ; Ruby on rails (Electronic resource) ; Ruby on rails (Electronic resource) ; COMPUTERS ; Programming ; Object Oriented ; Ruby (Computer program language) ; Web site development ; Electronic books ; Electronic books
    Abstract: Describes how to design and write Rails code to create a variety of applications.
    Note: Print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Amsterdam : Elsevier/Morgan Kaufmann
    ISBN: 9780080555881 , 0080555888
    Language: English
    Pages: 1 online resource (xxxvii, 537 pages) , illustrations
    Series Statement: Morgan Kaufmann series in networking
    Series Statement: Morgan Kaufmann series in computer security
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer networks / Security measures ; Computer networks / Reliability ; Computer security ; Computer networks / Reliability ; Computer networks / Security measures ; Computer security ; Security measures ; Reliability ; Computer networks / Security measures ; Computer security ; Computer networks / Reliability ; Computer networks / Security measures ; Computer networks / Reliability ; Computer networks ; Computer networks Security measures ; Computer networks Reliability ; Computer security ; Computersicherheit ; Rechnernetz ; Zuverlässigkeit ; Rechnernetz ; Zuverlässigkeit ; Computersicherheit
    Abstract: In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks
    Abstract: Printbegrænsninger: Der kan printes kapitelvis
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    ISBN: 9781035305520
    Language: English
    Pages: 1 Online-Ressource (viii, 358 pages) , illustrations
    Series Statement: New dimensions in networks
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als Cooperative networks
    DDC: 003
    RVK:
    Keywords: Mathematische Optimierung ; Netzwerk ; Kooperation ; Operations Research ; System analysis ; Information networks ; Mathematical optimization ; Information networks ; Aufsatzsammlung ; Konferenzschrift ; Rechnernetz ; Kooperation ; Netzwerk
    Abstract: Cooperative networks have gained a tremendous amount of attention over the last several years because of their existence not only in biological, social and economic arenas, but because of direct applications in many more areas such as communications, robotics and military sciences. This volume reflects a cross-fertilization of ideas from a broad set of disciplines and creativity from a diverse array of scientific and engineering research. While the benefits of networks in general have been recognized for quite some time, the idea of cooperative networks has several novel implications. Because distributed processing by heterogeneous nodes promises significant increases in system capability, performance and efficiency, research has intensified with a breadth of promising applications. Topics in this volume include networks of unmanned vehicles in uncertain environments, networks subject to eavesdropping and jamming, optimal node task-allocation, network complexity analysis, cooperative search involving multiple unmanned vehicles, and cooperative communications in ad-hoc networks, optimal control and optimization in man-in-the-loop scenarios. A broad array of readers, including faculty, graduate students and researchers interested in optimization, computer science, engineering, the social and behavioral sciences and related applications in cooperative systems will find this volume of great value
    Description / Table of Contents: Contents: Preface -- 1. Token-based approach for scalable team coordination / Yang Xu, Paul Scerri, Michael Lewis and Katia Sycara -- 2. Consensus controllability for coordinated multi-agent systems / Zhipu Jin and Richard M. Murray -- 3. Decentralized cooperative optimization for systems coupled through the constraints / Yoshiaki Kuwata and Jonathan P. How -- 4. Consensus building in cooperative control with information feedback / Wei Ren -- 5. Levy flights in robot swarm control and optimization / Yechiel J. Crispin -- 6. Eavesdropping and jamming communication networks / Clayton W. Commander, Panos M. Pardalos, Valeriy Ryabchenko, Oleg Shylo, Stan Uryasev, Grigoriy Zrazhevsky -- 7. Network algorithms for the dual of the constrained shortest path problem / Bogdan Grechuk, Anton Molyboha, Michael Zabarankin -- 8. Towards an irreducible theory of complex systems / Victor Korotkikh -- 9. Complexity of a system as a key to its optimization / Victor Korotkikh and Galina Korotkikh -- 10. Grasp with path-relinking for the cooperative communication problem on ad hoc networks / Clayton W. Commander, Paola Festa, Carlos A.S. Oliveira, Panos M. Pardalos, Mauricio G.C. Resende and Marco Tsitselis -- 11. Optimal control of an atr module - equipped mav/human operator team / Meir Pachter, Philip R. Chandler and Dharba Swaroop -- 12. An investigation of a dynamic sensor motion strategy / Nathan P. Yerrick, Abhishek Tiwari and David E. Jeffcoat -- 13. Market based adaptive task allocations for autonomous agents / Jared W. Patterson and Kendall E. Nygard -- 14. Cooperative persistent surveillance search algorithms using multiple unmanned aerial vehicles / Daniel J. Pack and George W.P. York -- 15. Social networks for effective teams / Paul Scerri and Katia Sycara -- 16. Optimization approaches for vision-based path planning for autonomous micro-air vehicles in urban environments / Michael Zabarankin, Andrew Kurdila, Oleg A. Prokopyev, Ryan Causey, Anukul Goel and Panos M. Pardalos -- 17. Cooperative stabilization and tracking for linear dynamic systems / Yi Guo -- Index.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Book
    Book
    Brimingham [u.a.] : Packt Publ.
    ISBN: 1847191053 , 9781847191052
    Language: English
    Pages: IV, 277 S , Ill., graph. Darst
    Edition: 1. publ.
    Series Statement: From technologies to solutions
    RVK:
    RVK:
    RVK:
    Keywords: Open source software ; Web site development ; Web sites Design ; Content Management ; Open Source ; JAX
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Book
    Book
    München : Fachbuchverl. Leipzig im Carl-Hanser-Verl.
    ISBN: 3446409718 , 9783446409712
    Language: German
    Pages: 646 S. , Ill., graph. Darst. , 190 mm x 120 mm
    Edition: 4., aktualisierte Aufl.
    Parallel Title: Online-Ausg. u.d.T. Henning, Peter A., 1958 - Taschenbuch Multimedia
    DDC: 006.7
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Multimedia systems ; Digital media ; Web sites Design ; Web site development ; Digital media ; Multimedia systems ; Web site development ; Web sites Design ; Multimedia ; Multimedia ; Multimedia
    Note: Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    ISBN: 9789264025516
    Language: English
    Pages: Online-Ressource (132 p.)
    Series Statement: OECD Reviews of Risk Management Policies
    Parallel Title: Erscheint auch als Norway
    RVK:
    RVK:
    Keywords: Datensicherheit ; Norwegen ; Science and Technology ; Norway ; Norwegen ; Computersicherheit ; Internet ; Datenschutz ; Innere Sicherheit
    Abstract: The development of information and communication technologies and networks, and in particular that of the Internet, has gone hand in hand with the emergence of new types of malevolent actions called cyber-crime: viruses, worms, Trojan horses, and the like. While a number of factors make a strong case for governmental action in the area of information security, there are also important limits to what governments can achieve. This review, the first in a series of risk management policy reviews being conducted by the OECD, identifies areas of good practice in Norway's policies for information security, as well as areas where improvements could be made. For areas that could benefit from improvement, it proposes opportunities for action and, when possible, suggests alternatives.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    ISBN: 3980921239
    Language: German , English
    Pages: 247 S. , Ill., graph. Darst.
    Parallel Title: Online-Ausg. EVA (12 : 2005 : Berlin) EVA 2005 Berlin
    DDC: 004
    RVK:
    RVK:
    Keywords: EVA ; Bildverarbeitung ; Multimedia ; Bildanalyse ; Museum Kongress ; Konferenzschrift ; Bildverarbeitung ; Museum
    Note: Beitr. teilw. dt., teilw. engl
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    New York, NY : Springer New York
    ISBN: 9780387271606
    Language: English
    Pages: Online-Ressource (X, 291 p, digital)
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Buchausg. u.d.T. Curtin, Matt Brute force
    RVK:
    Keywords: Science (General) ; Data encryption (Computer science) ; Coding theory ; Computer science ; Mathematics ; Popular Science ; Science (General) ; Data encryption (Computer science) ; Coding theory ; Computer science ; Mathematics ; Kryptologie ; Kryptologie ; Computersicherheit
    Abstract: In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and intriguing book, Matt Curtin charts the rise and fall of DES and chronicles the efforts of those who were determined to master it.
    Abstract: "In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved to be rigorous enough. In 1973, the NBS put out an open call for a new, stronger encryption system that would become the new federal standard. Several years later, IBM responded with a system called Lucifer that came to simply be known as DES (data encryption standard). The strength of an encryption system is best measured by the attacks it is able to withstand, and because DES was the federal standard, many tried to test its limits. (It should also be noted that a number of cryptographers and computer scientists told the NSA that DES was not nearly strong enough and would be easily hacked.) Rogue hackers, usually out to steal as much information as possible, tried to break DES. A number of ""white hat"" hackers also tested the system and reported on their successes. Still others attacked DES because they believed it had outlived its effectiveness and was becoming increasingly vulnerable. The sum total of these efforts to use all of the possible keys to break DES over time made for a brute force attack.In 1996, the supposedly uncrackable DES was broken. In this captivating and intriguing book, Matt Curtin charts DES's rise and fall and chronicles the efforts of those who were determined to master it."
    Description / Table of Contents: Working lateKeeping secrets -- Data encryption standard -- Key length -- Discovery -- RSA crypto challenges -- Congress takes note -- Supercomputer -- Organizing DESCHALL -- Needle in a haystack -- Spreading the word -- The race is on -- Clients -- Architecture -- Progress -- Trouble -- Milestones -- Gateways -- Network -- Download -- Short circuit -- DESCHALL community -- Proposal -- In the lead -- Recruiting -- Threats -- Overdrive -- Distributed -- An obstacle -- Export -- Getting word out -- Salvos in the crypto wars -- New competition -- Netlag -- Terminal velocity -- Duct tape -- Showdown in the senate -- Strong cryptography makes the world a safer place -- Aftermath -- Staying the course -- In retrospect.
    Note: Includes bibliographical references (p. 283-285) and index
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    ISBN: 3980702928
    Language: German , English
    Pages: 236 S. , Ill. u. graph. Darst
    Parallel Title: Online-Ausg. EVA (7 : 2000 : Berlin) EVA 2000 Berlin
    DDC: 004
    RVK:
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift 2000 ; Bildverarbeitung ; Museum ; Kunst
    Note: Text teilw. dt., teilw. engl
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...