Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (50)
  • Computer security  (21)
  • Big Data  (18)
  • Datenanalyse  (17)
  • Computer Science  (50)
Datasource
Material
Language
Subjects(RVK)
  • 1
    Language: German
    RVK:
    RVK:
    Keywords: SPSS ; Datenanalyse
    Note: Bd. 1 hrsg. von Leile Akremi; Nina Baur; Sabine Fromm, Bd. 2 verf. von Sabine Fromm , Bis 2. Aufl. 2008 in einem Bd. erschienen , Später im Verl. Springer VS, Wiesbaden, erschienen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9783658342852
    Language: German
    Pages: 1 Online-Ressource (XX, 392 Seiten) , Illustrationen, Diagramme
    Parallel Title: Erscheint auch als
    DDC: 302.201
    RVK:
    RVK:
    RVK:
    Keywords: Media and Communication Methods ; Statistics in Social Sciences, Humanities, Law, Education, Behavorial Sciences, Public Policy ; Communication—Methodology ; Social sciences—Statistical methods ; R ; Datenanalyse ; Forschungsbericht ; Lehrbuch ; Lehrbuch ; Lehrbuch ; Datenanalyse ; R ; Forschungsbericht
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Imprint: Palgrave Macmillan
    ISBN: 9783031122408
    Language: English
    Pages: 1 Online-Ressource (XXV, 272 p. 41 illus., 31 illus. in color.)
    Series Statement: Springer eBook Collection
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als Big data in finance
    RVK:
    RVK:
    RVK:
    Keywords: Big Data ; Data Mining ; Finanzdienstleistung ; Finanzsektor ; Finanztechnologie ; Künstliche Intelligenz ; Digitalisierung ; Financial engineering. ; Big data. ; Big data ; Artificial intelligence ; Quantitative trading ; Financial services ; Deep learning ; FinTech ; Aufsatzsammlung
    Abstract: Chapter 1: Big Data in Finance: An Overview -- SECTION I: BIG DATA IN THE FINANCIAL MARKETS -- Chapter 2: Alternative Data -- Chapter 3: An Algorithmic Trading Strategy to Balance Profitability and Risk -- Chapter 4: High-Frequency Trading and Market Efficiency in the Moroccan Stock Market -- Chapter 5: Ensemble Models using Symbolic Regression and Genetic Programming for Uncertainty Estimation in ESG and Alternative Investments -- SECTION II: BIG DATA IN FINANCIAL SERVICES -- Chapter 6: Consumer Credit Assessments in the Age of Big Data -- Chapter 7; Robo-Advisors: A Big Data Challenge -- Chapter 8: Bitcoin: Future or Fad? -- Chapter 9: Culture, Digital Assets, and the Economy: A Trans-National Perspective -- SECTION III: CASE STUDIES AND APPLICATIONS -- Chapter 10: Islamic Finance in Canada Powered by Big Data: A Case Study -- Chapter 11: Assessing the Carbon Footprint of Cryptoassets: Evidence from a Bivariate VAR Model -- Chapter 12:A Data-informed Approach to Financial Literacy Enhancement using Cognitive & Behavioral Analytics.
    Abstract: This edited book explores the unique risks, opportunities, challenges, and societal implications associated with big data developments within the field of finance. While the general use of big data has been the subject of frequent discussions, this book will take a more focused look at big data applications in the financial sector. With contributions from researchers, practitioners, and entrepreneurs involved at the forefront of big data in finance, the book discusses technological and business-inspired breakthroughs in the field. The contributions offer technical insights into the different applications presented and highlight how these new developments may impact and contribute to the evolution of the financial sector. Additionally, the book presents several case studies that examine practical applications of big data in finance. In exploring the readiness of financial institutions to adapt to new developments in the big data/artificial intelligence space and assessing different implementation strategies and policy solutions, the book will be of interest to academics, practitioners, and regulators who work in this field. Thomas Walker is a Full Professor of Finance and the Concordia University Research Chair in Emerging Risk Management at Concordia University, Montreal, Canada. Prior to academia, he worked for several years in the German consulting and industrial sector at Mercedes Benz, Utility Consultants International, Lahmeyer International, Telenet, and KPMG Peat Marwick. Frederick Davis is an Associate Professor at the John Molson School of Business at Concordia University, Montreal, Canada. Prior to his academic career, he worked for several years in the government sector assisting communities with their economic development. His research interests include mergers and acquisitions, insider trading, big data, and other aspects of corporate finance. Tyler Schwartz holds an MSc degree in Data Science and Business Analytics from HEC Montreal. He has served as a research assistant in the Department of Finance at Concordia University for over four years and is the co-author of an edited book collection on climate change adaptation as well as working papers on social impact bonds and the Sustainable Development Goals (SDGs).
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Wiesbaden : Springer VS
    ISBN: 9783658372828
    Language: German
    Pages: 1 Online-Ressource (IX, 233 Seiten) , Illustrationen
    Edition: 2.,aktualisierte Auflage
    Series Statement: Studientexte zur Soziologie
    Parallel Title: Erscheint auch als
    DDC: 301.01
    RVK:
    RVK:
    Keywords: Sociological Methods ; Sociology—Methodology ; Quantitative Methode ; SPSS ; Datenanalyse ; ALLBUS ; Lehrbuch ; Lehrbuch ; Lehrbuch ; Quantitative Methode ; SPSS ; ALLBUS ; Datenanalyse ; SPSS
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Oxford : Oxford University Press
    ISBN: 9780191840166
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Oxford handbooks online
    Series Statement: Political Science
    Parallel Title: Erscheint auch als The Oxford handbook of cyber security
    DDC: 005.8
    RVK:
    Keywords: Computer security ; Computer networks Security measures ; Computersicherheit ; Cyberattacke ; Computerkriminalität ; Sicherheitspolitik
    Abstract: 'The Oxford Handbook of Cyber Security' presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, amd national level.
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Wiley | Boston, MA : Safari
    ISBN: 9781119740759
    Language: English
    Pages: 1 online resource (400 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Big data analytics for Internet of things
    DDC: 005.7
    RVK:
    Keywords: Electronic books ; local ; Big Data ; Datenverarbeitung ; Internet der Dinge
    Abstract: BIG DATA ANALYTICS FOR INTERNET OF THINGS Discover the latest developments in IoT Big Data with a new resource from established and emerging leaders in the field Big Data Analytics for Internet of Things delivers a comprehensive overview of all aspects of big data analytics in Internet of Things (IoT) systems. The book includes discussions of the enabling technologies of IoT data analytics, types of IoT data analytics, challenges in IoT data analytics, demand for IoT data analytics, computing platforms, analytical tools, privacy, and security. The distinguished editors have included resources that address key techniques in the analysis of IoT data. The book demonstrates how to select the appropriate techniques to unearth valuable insights from IoT data and offers novel designs for IoT systems. With an abiding focus on practical strategies with concrete applications for data analysts and IoT professionals, Big Data Analytics for Internet of Things also offers readers: A thorough introduction to the Internet of Things, including IoT architectures, enabling technologies, and applications An exploration of the intersection between the Internet of Things and Big Data, including IoT as a source of Big Data, the unique characteristics of IoT data, etc. A discussion of the IoT data analytics, including the data analytical requirements of IoT data and the types of IoT analytics, including predictive, descriptive, and prescriptive analytics A treatment of machine learning techniques for IoT data analytics Perfect for professionals, industry practitioners, and researchers engaged in big data analytics related to IoT systems, Big Data Analytics for Internet of Things will also earn a place in the libraries of IoT designers and manufacturers interested in facilitating the efficient implementation of data analytics strategies.
    Note: Online resource; Title from title page (viewed April 20, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9783593514703 , 3593514702
    Language: German
    Pages: 245 Seiten , Illustrationen , 22 cm x 13.8 cm
    Parallel Title: Erscheint auch als Otte, Ralf Maschinenbewusstsein
    Parallel Title: Erscheint auch als Otte, Ralf Maschinenbewusstsein
    DDC: 303.4833
    RVK:
    RVK:
    RVK:
    Keywords: Artificial intelligence Forecasting ; Artificial intelligence Social aspects ; Einführung ; Künstliche Intelligenz ; Maschine ; Bewusstsein ; Transhumanismus ; Gefahr ; Künstliche Intelligenz ; Maschine ; Bewusstsein ; Künstliche Intelligenz ; Bewusstsein ; Big Data ; Transhumanismus ; Ethischer Konflikt
    Abstract: Von vielen noch unbemerkt ist die KI-Entwicklung ins Stocken geraten. Es gibt bis heute keine vollautonom fahrenden Serienautos, keine vollautonomen Kraftwerke und keine KI-Fabriken. Auch würde niemand sein Leben einem Roboterchirurgen anvertrauen. Ist Big Data eine Sackgasse? "Wir stehen an der Schwelle zu einer neuen KI," sagt Professor Ralf Otte. Weg von der Software hin zu einer dem Gehirn nachempfundenen Hardware. Unser Dilemma: Wir öffnen damit auch die Tür zu einer noch gefährlicheren Verschmelzung von Mensch und Maschine. Überschreiten wir die Grenze zum Maschinenbewusstsein aber nicht, wird Europa als Industriegemeinschaft keine Rolle mehr spielen. Der KI-Experte zeigt, was auf uns zukommen könnte. Doch welche Maschinen wir haben werden, sollte keine technologische oder ökonomische, sondern eine gesamtgesellschaftliche Entscheidung sein
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9783960103370
    Language: English , German
    Pages: 1 Online-Ressource (400 pages)
    Edition: 2. Auflage
    Parallel Title: Erscheint auch als Grus, Joel Einführung in Data Science
    RVK:
    RVK:
    Keywords: Data mining ; Electronic books ; local ; Data Mining ; Datenanalyse ; Datenstruktur ; Python ; Datenanalyse ; Python 2.7 ; Data Mining
    Abstract: Dieses Buch führt Sie in Data Science ein, indem es grundlegende Prinzipien der Datenanalyse erläutert und Ihnen geeignete Techniken und Werkzeuge vorstellt. Sie lernen nicht nur, wie Sie Bibliotheken, Frameworks, Module und Toolkits konkret einsetzen, sondern implementieren sie auch selbst. Dadurch entwickeln Sie ein tieferes Verständnis für die Zusammenhänge und erfahren, wie essenzielle Tools und Algorithmen der Datenanalyse im Kern funktionieren. Falls Sie Programmierkenntnisse und eine gewisse Sympathie für Mathematik mitbringen, unterstützt Joel Grus Sie dabei, mit den mathematischen und statistischen Grundlagen der Data Science vertraut zu werden und sich Programmierfähigkeiten anzueignen, die Sie für die Praxis benötigen. Dabei verwendet er Python: Die weit verbreitete Sprache ist leicht zu erlernen und bringt zahlreiche Bibliotheken für Data Science mit.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    Cambridge ; Medford, MA : Polity
    ISBN: 9781509530403 , 9781509530410
    Language: English
    Pages: vii, 205 Seiten , 23 cm
    Uniform Title: Das metrische Wir
    Parallel Title: Erscheint auch als
    DDC: 303.4833
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Big Data ; Ranking ; Data Mining ; Ungerechtigkeit ; Datenanalyse ; Soziale Ungleichheit ; Big Data ; Datenanalyse ; Data Mining ; Ranking ; Soziale Ungleichheit ; Ungerechtigkeit
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9783658258771
    Language: German
    Pages: 1 Online-Ressource (XVI, 147 Seiten)
    Series Statement: Springer eBooks
    Series Statement: Social Science and Law
    Series Statement: Springer eBook Collection
    Parallel Title: Erscheint auch als Feiks, Markus, 1985 - Empirische Sozialforschung mit Python
    DDC: 300.1
    RVK:
    RVK:
    Keywords: Social sciences Methodology ; Methodology of the Social Sciences ; Sociology-Research ; Social sciences. ; Communication. ; Einführung ; Einführung ; Empirische Sozialforschung ; Python ; Datenanalyse ; Visualisierung ; Python ; Python 3.7 ; Datenanalyse ; Visualisierung ; Empirische Sozialforschung
    Abstract: Einleitung -- Python verstehen und anwenden -- Verarbeitung tabellarischer Daten in Python -- Datenerhebung mit Python am Beispiel von Twitter und Nachrichtenmedien -- Statistische Berechnungen mit Python -- Daten visualisieren -- Ausblick -- Weiterführende Literatur
    Abstract: In Zeiten von „Big Data“ wird es zunehmend wichtiger, Datenprozesse automatisieren zu können. In diesem Buch wird die Programmsprache Python dazu eingesetzt, Daten automatisiert zu erheben, diese auszuwerten und Zusammenhänge zu visualisieren. Die Beispiele sind einfach gehalten und können jedoch auf eigene, komplexere Vorhaben übertragen werden. Daher eignet sich das Buch für all jene, die noch keine Erfahrung mit der Programmierung gesammelt haben. Der Inhalt Python verstehen und anwenden.- Verarbeitung tabellarischer Daten in Python.- Datenerhebung mit Python am Beispiel von Twitter und Nachrichten-Medien.- Statistische Berechnungen mit Python.- Daten visualisieren Die Zielgruppen Dozierende und Lehrende der Sozialwissenschaften Der Autor Dr. Markus Feiks war wissenschaftlicher Mitarbeiter am Institut für Medienwissenschaft der Eberhard Karls Universität Tübingen. In seiner Dissertation hat er sich mit künstlicher Kreativität in der Werbebranche beschäftigt und dazu eine Diskursanalyse durchgeführt. In seiner Lehre hat er vor allem Seminare zu Methoden der empirischen Sozial- sowie Kommunikationsforschung gegeben
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Wiesbaden :Springer VS,
    ISBN: 978-3-658-27248-7
    Language: German
    Pages: 1 Online-Ressource (IX, 232 Seiten) : , Illustrationen.
    Series Statement: Studientexte zur Soziologie
    Parallel Title: Erscheint auch als
    DDC: 300.1
    RVK:
    RVK:
    Keywords: Methodology of the Social Sciences ; Electoral Politics ; Comparative Politics ; Social sciences ; Elections ; Comparative politics ; Datenanalyse. ; SPSS. ; Quantitative Methode. ; ALLBUS. ; Lehrbuch ; Lehrbuch ; Datenanalyse ; SPSS ; Quantitative Methode ; SPSS ; ALLBUS
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 978-3-658-22094-5
    Language: German
    Pages: XIII, 317 Seiten : , Illustrationen ; , 24 cm x 16.8 cm.
    Series Statement: Lehrbuch
    Parallel Title: Erscheint auch als
    DDC: 300.28553
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Qualitative Sozialforschung. ; Datenanalyse. ; Software. ; Lehrbuch ; Lehrbuch ; Qualitative Sozialforschung ; Datenanalyse ; Software
    Abstract: Dieses Buch vermittelt auf verständliche Weise das Wissen, um qualitative und Mixed-Methods-Daten mit MAXQDA auszuwerten. Die Autoren verfügen über jahrzehntelange Forschungserfahrung und decken in diesem Buch ein breites Methodenspektrum ab. Sie beschränken sich nicht auf einzelne Forschungsansätze, sondern vermitteln das Know-how, um verschiedene Methoden – von der Grounded Theory über Diskursanalysen bis zur Qualitativen Inhaltsanalyse – mit MAXQDA umsetzen zu können. Darüber hinaus werden spezielle Themen fokussiert, wie Transkription, Kategorienbildung, Visualisierungen, Videoanalyse, Concept-Maps, Gruppenvergleiche und die Erstellung von Literaturreviews.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9781788836388 , 1788836383
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als
    RVK:
    Keywords: Big data ; Information technology Management ; Electronic data processing Distributed processing ; Big Data ; Datenmanagement ; Big Data ; Datenmanagement
    Note: Description based on online resource; title from title page (Safari, viewed July 12, 2018)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    San Francisco, CA : No Starch Press
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als Sweigart, Al Cracking codes with Python
    DDC: 005.8
    RVK:
    Keywords: Data encryption (Computer science) ; Python (Computer program language) ; Computer security ; Hacking ; Electronic books ; Electronic books ; local ; Python ; Python
    Abstract: "Learn how to program in Python while making and breaking ciphers-algorithms used to create and send secret messages! After a crash course in Python programming basics, you'll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You'll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today's online transactions, including digital signatures, email, and Bitcoin. Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you'll have learned how to code in Python and you'll have the clever programs to prove it! You'll also learn how to: • Combine loops, variables, and flow control statements into real working programs• Use dictionary files to instantly detect whether decrypted messages are valid English or gibberish• Create test programs to make sure that your code encrypts and decrypts correctly• Code (and hack!) a working example of the affine cipher, which uses modular arithmetic to encrypt a message• Break ciphers with techniques such as brute-force and frequency analysis There's no better way to learn to code than to play with real programs. Cracking Codes with Python makes the learning fun!"
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Book
    Book
    Cambridge, Massachusetts : The MIT Press
    ISBN: 9780262535434
    Language: English
    Pages: xi, 264 Seiten , Diagramme , 18 cm
    Series Statement: The MIT Press essential knowledge series
    Parallel Title: Erscheint auch als Kelleher, John D., 1974 - Data science
    Parallel Title: Erscheint auch als Kelleher, John D., 1974 - Data science
    DDC: 005.7
    RVK:
    RVK:
    Keywords: Big data ; Machine learning ; Data mining ; Quantitative research ; Big data ; Data mining ; Machine learning ; Quantitative research ; Einführung ; Data Science ; Big Data ; Maschinelles Lernen
    Abstract: The goal of data science is to improve decision making through the analysis of data. Today data science determines the ads we see online, the books and movies that are recommended to us online, which emails are filtered into our spam folders, and even how much we pay for health insurance. This volume in the MIT Press Essential Knowledge series offers a concise introduction to the emerging field of data science, explaining its evolution, current uses, data infrastructure issues, and ethical challenges. Einführung in das Gebiet der Datenwissenschaft.
    Note: Hier auch später erschienene, unveränderte Nachdrucke
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9783658200831
    Language: German
    Pages: Online-Ressource (VIII, 178 S. 15 Abb, online resource)
    Series Statement: Schriftenreihe der ASI - Arbeitsgemeinschaft Sozialwissenschaftlicher Institute
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Druckausg. u.d.T. Big Data - Chancen, Risiken, Entwicklungstendenzen (Veranstaltung : 2017 : Wiesbaden) Big Data
    RVK:
    RVK:
    Keywords: Mass media ; Social Sciences ; Social sciences ; Sociology Research ; Communication ; Sociology ; Technology—Sociological aspects. ; Big data. ; Social sciences ; Sociology Research ; Communication ; Sociology ; Mass media ; Aufsatzsammlung ; Big Data
    Abstract: Big Data, also große, komplexe und schnelllebige Datenmengen, werden in der akademischen Sozialforschung, der Marktforschung und der amtlichen Statistik zunehmend analysiert, um relevante Fragestellungen zu beantworten. Das Buch gibt einen Überblick über die aktuelle Nutzung von Big Data in verschiedenen Bereichen sowie die damit verbundenen Chancen und Risiken, stellt neue Studiengänge vor, die zum Umgang mit Big Data befähigen, und behandelt Datenschutzanforderungen und Normen, die bei der Nutzung von Big Data relevant sind. Die Zielgruppen WissenschaftlerInnen, PraktikerInnen und Studierende aus den Sozialwissenschaften, der Marktforschung und der amtlichen Statistik. Die Herausgeber Christian König ist Referent im Institut für Forschung und Entwicklung in der Bundesstatistik des Statistischen Bundesamtes, Wiesbaden und Dozent für das Fach Wirtschaftsmathematik an der Verwaltungs- und Wirtschaftsakademie Wiesbaden e. V. Jette Schröder ist Projektberaterin bei GESIS – Leibniz-Institut für Sozialwissenschaften und Geschäftsführerin der Arbeitsgemeinschaft Sozialwissenschaftlicher Institute e. V. (ASI). Erich Wiegand ist Geschäftsführer des ADM Arbeitskreis Deutscher Markt- und Sozialforschungsinstitute e.V. .
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 978-3-8376-3957-5 , 3-8376-3957-6
    Language: German
    Pages: 387 Seiten ; , 22.5 cm x 14.8 cm, 498 g.
    Series Statement: Digitale Gesellschaft Band 17
    Series Statement: Digitale Gesellschaft
    Parallel Title: Erscheint auch als
    DDC: 300
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Digitalisierung. ; Big Data. ; Medientheorie. ; Gesellschaft. ; Medien. ; Algorithmus. ; Informationsgesellschaft. ; Soziologie. ; Neue Medien. ; Datafizierung ; Big Data ; Algorithmen ; Technik ; Sozialtheorie ; Medien ; Gesellschaft ; Mediensoziologie ; Digitale Medien ; Medientheorie ; Medienwissenschaft ; Soziologie ; Digitalization ; Datafication ; Algorithms ; Technology ; Social Theory ; Media ; Society ; Sociology of Media ; Digital Media ; Media Theory ; Media Studies ; Sociology ; Konferenzschrift 2016 ; Aufsatzsammlung ; Aufsatzsammlung ; Konferenzschrift 2016 ; Aufsatzsammlung ; Konferenzschrift 2016 ; Digitalisierung ; Big Data ; Medientheorie ; Gesellschaft ; Medien ; Algorithmus ; Informationsgesellschaft ; Soziologie ; Neue Medien
    Note: Aus der Einführung: "Ausgangspunkt des vorliegenden Sammelbandes waren die Tagung "Daten\Gesellschaft!?", die im März 2016 im Institut für Soziologie der RWTH Aachen stattfand und die Ad-Hoc-Gruppe "Klassifikation und Big Data. Ein- und Ausschlüsse in der Datengesellschaft", die wir [...] am 38. Kongress der Deutschen Gesellschaft für Soziologie in Bamberg organisieren konnten."
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9781138351899
    Language: English
    Pages: x, 180 Seiten , Illustrationen
    Edition: First issued in paperback
    Series Statement: Routledge advances in sociology 189
    Series Statement: Routledge advances in sociology
    Parallel Title: Erscheint auch als Algorithmic cultures
    DDC: 303.48/33
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Information society ; Technological innovations Social aspects ; Algorithms Social aspects ; Big data Social aspects ; Algorithms ; Big data ; Gesellschaft ; Information society ; Technological innovations ; Algorithmus ; Big Data ; Informationsgesellschaft
    Abstract: What are algorithmic cultures? / Jonathan Roberge / Robert Seyfert -- The algorithmic choreography of the impressionable subject / Lucas D. Introna -- #trendingistrending : when algorithms become culture / Tarleton Gillespie -- Shaping consumers' online voices : algorithmic apparatus or evaluation culture? / Jean-Samuel Beuscart / Kevin Mellet -- Deconstructing the algorithm : four types of digital information calculations / Dominique Cardon -- Baffled by an algorithm : mediation and the auditory relations of "immersive audio" / Joe Klett -- Algorhythmic ecosystems : neoliberal couplings and their pathogenesis 1960 present / Shinataro Miyazaki -- Drones : the mobilization of algorithms / Valentin Rauer -- Social bots as algorithmic pirates and messengers of techno-environmental agency / Oliver Leistert
    Note: Enthält Literaturangaben und Index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9781138286191 , 9781138286184
    Language: English
    Pages: xviii, 207 Seiten , Illustrationen, Diagramme , 26 cm
    Series Statement: Developing qualitative inquiry
    DDC: 001.4/2028553
    RVK:
    RVK:
    Keywords: MAXQDA (Computer file) ; Qualitative research Methodology ; Qualitative research Data processing ; MAXQDA (Computer file) ; Qualitative research ; Qualitative Methode ; Strategie ; Datenanalyse ; Software
    Note: Literaturangaben und Index , Erscheint auch als Online-Ausgabe
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9783658117818
    Language: German
    Pages: 1 Online-Ressource (VI, 276 Seiten) , Illustrationen
    Series Statement: Medien • Kultur • Kommunikation
    Parallel Title: Erscheint auch als
    DDC: 302.2
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Social sciences ; Cultural studies ; Communication ; Sociology ; Mass media ; Data Mining ; Verhaltensmodifikation ; Personenbezogene Daten ; Leistungssteigerung ; Datenanalyse ; Big Data ; Soziokultureller Wandel ; Selbstmanagement ; Gesundheitsvorsorge ; Informationstechnik ; Social Media ; Konferenzschrift 2014 ; Konferenzschrift 2014 ; Konferenzschrift 2014 ; Konferenzschrift 2014 ; Konferenzschrift 2014 ; Konferenzschrift 2014 ; Konferenzschrift 2014 ; Konferenzschrift 2014 ; Konferenzschrift 2014 ; Konferenzschrift 2014 ; Konferenzschrift 2014 ; Konferenzschrift 2014 ; Social Media ; Big Data ; Personenbezogene Daten ; Datenanalyse ; Data Mining ; Verhaltensmodifikation ; Leistungssteigerung ; Gesundheitsvorsorge ; Informationstechnik ; Selbstmanagement ; Soziokultureller Wandel
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9783518072929 , 3518072927
    Language: German
    Pages: 307 Seiten
    Edition: 3. Auflage, Sonderdruck, Originalausgabe
    Series Statement: edition suhrkamp
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Information technology Social aspects ; Data mining ; Big data ; Ranking ; Big Data ; Data Mining ; Datenanalyse ; Soziale Ungleichheit ; Ungerechtigkeit ; Big Data ; Datenanalyse ; Data Mining ; Ranking ; Soziale Ungleichheit ; Ungerechtigkeit
    Note: Literaturverzeichnis: Seite 287-307
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 9780128038383 , 0128038381
    Language: English
    Pages: 1 online resource (273 pages) , illustrations
    Series Statement: Syngress advanced topics in information security
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    RVK:
    Keywords: COMPUTERS / Security / General ; Computer networks / Security measures ; Computer security ; Cyber intelligence (Computer security) ; Computer security ; Computer networks Security measures ; Cyber intelligence (Computer security) ; Informationssystem ; Unternehmen ; Datensicherung ; Computersicherheit ; Rechnernetz ; Rechnernetz ; Computersicherheit ; Datensicherung ; Unternehmen ; Datensicherung ; Informationssystem
    Abstract: "Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic.
    Abstract: The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system's performance.
    Abstract: Presents the most current and leading edge research on system safety and security, featuring a panel of top experts in the field Includes several research advancements published for the first time, including the use of 'goal structured notation' together with a 'judgment calculus' and their automation as a 'rule set' to facilitate systems safety and systems security process execution in compliance with existing standards Presents for the first time the latest research in the field with the unique perspective that systems safety and systems security are inextricably intertwined Includes coverage of systems architecture, cyber physical systems, tradeoffs between safety, security, and performance, as well as the current methodologies and technologies and implantation practices for system safety and security"--Provided by publisher
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Cambridge, MA : Syngress, an imprint of Elsevier
    ISBN: 9780128045053 , 0128045051 , 0128044586 , 9780128044582
    Language: English
    Pages: 1 online resource (144 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 004.67/8
    RVK:
    RVK:
    Keywords: COMPUTERS / Computer Literacy ; COMPUTERS / Computer Science ; COMPUTERS / Data Processing ; COMPUTERS / Hardware / General ; COMPUTERS / Information Technology ; COMPUTERS / Machine Theory ; COMPUTERS / Reference ; Computer networks / Security measures ; Computer security ; Internet of things ; Internet of things ; Computer networks Security measures ; Computer security ; Internet der Dinge ; Computersicherheit ; Internet der Dinge ; Computersicherheit
    Abstract: "Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9783958456372 , 3958456375
    Language: German
    Pages: 1 Online-Ressource , illustrations
    Edition: 1. Auflage.
    RVK:
    RVK:
    RVK:
    Keywords: Internet ; Security measures ; Computer security ; Data protection ; Privacy, Right of ; Electronic books ; Electronic books ; local ; Internet ; Personenbezogene Daten ; Privatsphäre ; Datenschutz ; Internet ; Daten ; Anonymität
    Abstract: Ob Sie wollen oder nicht - jede Ihrer Online-Aktivitäten wird beobachtet und analysiert. Sie haben keine Privatsphäre. Im Internet ist jeder Ihrer Klicks für Unternehmen, Regierungen und kriminelle Hacker uneingeschränkt sichtbar. Ihr Computer, Ihr Smartphone, Ihr Auto, Ihre Alarmanlage, ja sogar Ihr Kühlschrank bieten potenzielle Angriffspunkte für den Zugriff auf Ihre Daten. Niemand kennt sich besser aus mit dem Missbrauch persönlicher Daten als Kevin D. Mitnick. Als von der US-Regierung ehemals meistgesuchter Computer-Hacker kennt er alle Schwachstellen und Sicherheitslücken des digitalen Zeitalters. Seine Fallbeispiele sind spannend und erschreckend: Sie werden Ihre Aktivitäten im Internet neu überdenken. Mitnick weiß aber auch, wie Sie Ihre Daten bestmöglich schützen. Er zeigt Ihnen anhand zahlreicher praktischer Tipps und Schritt-für-Schritt-Anleitungen, was Sie tun können, um online und offline anonym zu sein. Bestimmen Sie selbst über Ihre Daten. Lernen Sie, Ihre Privatsphäre im Internet zu schützen. Kevin D. Mitnick zeigt Ihnen, wie es geht. Hinterlassen Sie keine Spuren • Sichere Passwörter festlegen und verwalten • Mit dem Tor-Browser im Internet surfen, ohne Spuren zu hinterlassen • E-Mails und Dateien verschlüsseln und vor fremden Zugriffen schützen • Öffentliches WLAN, WhatsApp, Facebook & Co. sicher nutzen • Sicherheitsrisiken vermeiden bei GPS, Smart-TV, Internet of Things und Heimautomation • Eine zweite Identität anlegen und unsichtbar werden
    Note: Authorized German translation of the English language edition: The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data. Cf. Title page verso. - Place of publication from publisher's website. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed January 4, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : mitp Verlag | Boston, MA : Safari
    ISBN: 9783958455481 , 9783958455474
    Language: English , German
    Pages: 1 online resource (432 pages)
    Edition: 1st edition
    Series Statement: Mitp Business
    Parallel Title: Erscheint auch als Provost, Foster, 1964 - Data Science für Unternehmen
    DDC: 658.403802856312
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Data mining ; Big data ; Business Data processing ; Management Data processing ; Electronic books ; local ; Exploration de données (Informatique) ; Données volumineuses ; Gestion ; Informatique ; Management ; Data processing ; Big data ; Business ; Data processing ; Data mining ; Unternehmen ; Datenmanagement ; Data Mining ; Datenanalyse
    Abstract: Die grundlegenden Konzepte der Data Science verstehen, Wissen aus Daten ziehen und für Vorhersagen und Entscheidungen nutzen Die wichtigsten Data-Mining-Verfahren gezielt und gewinnbringend einsetzen Zahlreiche Praxisbeispiele zur Veranschaulichung Die anerkannten Data-Science-Experten Foster Provost und Tom Fawcett stellen in diesem Buch die grundlegenden Konzepte der Data Science vor, die für den effektiven Einsatz im Unternehmen von Bedeutung sind. Sie erläutern das datenanalytische Denken, das erforderlich ist, damit Sie aus Ihren gesammelten Daten nützliches Wissen und geschäftlichen Nutzen ziehen können. Sie erfahren detailliert, welche Methoden der Data Science zu hilfreichen Erkenntnissen führen, so dass auf dieser Grundlage wichtige Entscheidungsfindungen unterstützt werden können. Dieser Leitfaden hilft Ihnen dabei, die vielen zurzeit gebräuchlichen Data-Mining-Verfahren zu verstehen und gezielt und gewinnbringend anzuwenden. Sie lernen u.a., wie Sie: Data Science in Ihrem Unternehmen nutzen und damit Wettbewerbsvorteile erzielen Daten als ein strategisches Gut behandeln, in das investiert werden muss, um echten Nutzen daraus zu ziehen Geschäftliche Aufgaben datenanalytisch angehen und den Data-Mining-Prozess nutzen, um auf effiziente Weise sinnvolle Daten zu sammeln Das Buch beruht auf einem Kurs für Betriebswirtschaftler, den Provost seit rund zehn Jahren an der New York University unterrichtet, und nutzt viele Beispiele aus der Praxis, um die Konzepte zu veranschaulichen. Das Buch richtet sich an Führungskräfte und Projektmanager, die Data-Science-orientierte Projekte managen, an Entwickler, die Data-Science-Lösungen implementieren sowie an alle angehenden Data Scientists und Studenten. Aus dem Inhalt: Datenanalytisches Denken lernen Der Data-Mining-Prozess Überwachtes und unüberwachtes Data Mining Einführung in die Vorhersagemodellbildung: von der Korrelation zur überwachten Segmentierung Anhand der Daten optimale Modellparameter finden mit Verfahren wie lineare und logistische Regression sowie Support Vector Machines Prinzip und Berechnung der Ähnlichkeit Nächste-Nachbarn-Methoden und Clustering Entscheidungsanalyse I: Was ist ein gutes Modell Visualisierung der Leistung von Modellen Evidenz und Wahrscheinlichkeiten Texte repräsentieren und auswerten Entscheidungsanalyse II: Analytisches Engineering Data Science und Geschäftsstrategie
    Note: Online resource; Title from title page (viewed October 27, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Wiesbaden : Springer Fachmedien Wiesbaden | Cham : Springer International Publishing AG
    ISBN: 9783658159023 , 3658159022
    Language: German
    Pages: 1 Online-Ressource (XX, 278 Seiten) , 45 Abb.
    Edition: 2nd ed. 2017
    Parallel Title: Erscheint auch als Manderscheid, Katharina Sozialwissenschaftliche Datenanalyse mit R
    DDC: 301.01
    RVK:
    RVK:
    RVK:
    Keywords: Sozialwissenschaften ; R ; Datenanalyse ; Sociology—Methodology ; Psychology—Methodology ; Communication ; Sociological Methods ; Psychological Methods ; Media and Communication ; Lehrbuch ; Einführung
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Cambridge, MA : Syngress is an imprint of Elsevier
    ISBN: 9780128004784 , 0128004789 , 0128000066 , 9780128000069
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Security / Networking ; Big data ; Computer security ; Computer security ; Big data ; Computersicherheit ; Bedrohung ; Big Data ; Prognose ; Computersicherheit ; Big Data ; Bedrohung ; Prognose
    Abstract: This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools
    Note: Includes index , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Cambridge, MA : Syngress is an imprint of Elsevier
    ISBN: 9780128033357 , 0128033355 , 012803291X , 9780128032916
    Language: English
    Pages: 1 online resource
    Edition: Second edition
    Parallel Title: Erscheint auch als
    DDC: 364.16/8
    RVK:
    Keywords: Microsoft Windows (Computer file) ; Microsoft Windows (Computer file) ; SOCIAL SCIENCE / Criminology ; Component software ; Computer networks / Security measures ; Computer security ; Operating systems (Computers) ; Operating systems (Computers) ; Computer crimes Investigation ; Methodology ; Computer networks Security measures ; Computer security ; Component software ; Datensicherung ; Computerkriminalität ; Rechnernetz ; Computerforensik ; Datensicherung ; Rechnernetz ; Computerforensik ; Computerkriminalität
    Abstract: Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. Named a 2011 Best Digital Forens
    Note: Includes index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Book
    Book
    Cambridge, Massachusetts ; London, England : Harvard University Press
    ISBN: 9780674970847 , 9780674368279
    Language: English
    Pages: 311 Seiten
    Edition: First Harvard University Press paperback edition
    DDC: 303.3
    RVK:
    RVK:
    RVK:
    Keywords: Macht ; Finanzdienstleistung ; Internet ; Unternehmen ; Wissen ; Überwachung ; Big Data ; Internet ; Finanzdienstleistung ; Unternehmen ; Wissen ; Macht ; Überwachung ; Big Data
    Note: Hier auch später erschienene, unveränderte Nachdrucke
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    ISBN: 9781137400529
    Language: English
    Pages: 1 Online-Ressource (XIII, 222 Seiten)
    Edition: Springer eBook Collection. Political Science and International Studies
    Series Statement: New security challenges series
    Parallel Title: Erscheint auch als Christou, George, 1973 - Cybersecurity in the European Union
    DDC: 005.8
    RVK:
    RVK:
    Keywords: Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Computer science ; Political science ; European Union ; International relations ; Politics and war ; Computer security ; Außenpolitik ; Politische Wissenschaft ; Computersicherheit ; Europäische Union ; Internet ; Internetkriminalität ; Politik ; Sicherheit
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.
    Abstract: Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    ISBN: 9780141985411
    Language: English
    Pages: x, 259 Seiten , Illustrationen
    Parallel Title: Erscheint auch als O'Neil, Cathy, 1972 - Weapons of Math Destruction
    RVK:
    RVK:
    RVK:
    Keywords: Big data Social aspects ; Big data Political aspects ; Social indicators Mathematical models ; Moral and ethical aspects ; Democracy ; Big data Social aspects ; United States ; Big data Political aspects ; United States ; Social indicators Mathematical models ; Moral and ethical aspects ; Democracy United States ; Informationsgesellschaft ; Sozialer Wandel ; Privatsphäre ; Datenschutz ; Big Data ; Mathematische Modellierung ; Soziale Ungleichheit ; Demokratie ; Gefährdung
    Note: Rückseite der Titelseite: "first published in Great Britain by Allen Lane 2016"
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    ISBN: 9781317553700 , 1317553705
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Series Statement: Routledge studies in innovation, organization and technology 41
    Parallel Title: Erscheint auch als
    DDC: 658.4/78
    RVK:
    Keywords: Data protection ; Computer security ; Management information systems ; Security measures ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: As retail businesses migrate to the digital realm, internal information theft incidents continue to threaten on-line and off-line retail operations. The evolving propagation of internal information theft has surpassed the traditional techniques of crime prevention practices. Many business organizations search for internal information theft prevention guides that fit into their retail business operation, only to be inundated with generic and theoretical models. This book examines applicable methods for retail businesses to effectively prevent internal information theft. Information Theft Prevention offers readers a comprehensive understanding of the current status of the retail sector information theft prevention models in relation to the internationally recognized benchmark of information security. It presents simple and effective management processes for ensuring better information system security, fostering a proactive approach to internal information theft prevention. Furthermore, it builds on well-defined retail business cases to identify applicable solutions for businesses today. Integrating the retail business operations and information system security practices, the book identifies ways to coordinate efforts across a business in order to achieve the best results. IT security managers and professionals, financial frauds consultants, cyber security professionals and crime prevention professionals will find this book a valuable resource for identifying and creating tools to prevent internal information theft.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    ISBN: 9780124201842 , 0124201849
    Language: English
    Pages: 1 online resource (xix, 439 pages) , illustrations
    Edition: Second edition
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 670.42/7
    RVK:
    Keywords: TECHNOLOGY & ENGINEERING / Industrial Engineering ; TECHNOLOGY & ENGINEERING / Industrial Technology ; TECHNOLOGY & ENGINEERING / Manufacturing ; TECHNOLOGY & ENGINEERING / Technical & Manufacturing Industries & Trades ; Computer security ; Corporate Network ; Computersicherheit ; Intelligentes Stromnetz ; SCADA / Programm ; Process control Security measures ; Computer security ; Intelligentes Stromnetz ; Computersicherheit ; SCADA ; Corporate Network ; Computersicherheit ; Corporate Network ; Intelligentes Stromnetz ; SCADA
    Abstract: Annotation
    Note: Previous edition: 2011 , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    ISBN: 9780128011317 , 0128011319 , 0128008679 , 9780128008676
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition
    Parallel Title: Erscheint auch als
    DDC: 004.7
    RVK:
    Keywords: COMPUTERS / Computer Literacy ; COMPUTERS / Computer Science ; COMPUTERS / Data Processing ; COMPUTERS / Hardware / General ; COMPUTERS / Information Technology ; COMPUTERS / Machine Theory ; COMPUTERS / Reference ; Big data ; Data mining ; Social media ; Cloud computing ; Computer software / Development ; Distributed operating systems (Computers) ; Social media ; Data mining ; Big data ; Data Mining ; Social Media ; Big Data ; Social Media ; Data Mining ; Big Data
    Abstract: Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field of social sensing, emphasizing the key problem faced by application designers: how to extract reliable information from data collected from largely unknown and possibly unreliable sources. The book explains how a myriad of societal applications can be derived from this massive amount of data collected and shared by average individuals. The title offers theoretical foundations to support emerging data-driven cyber-physical applications and touches on key issues such as privacy. The authors present solutions based on recent research and novel ideas that leverage techniques from cyber-physical systems, sensor networks, machine learning, data mining, and information fusion
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    ISBN: 9780128005064 , 0128005068
    Language: English
    Pages: 1 online resource (xv, 166 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer security ; Information resources management / Security measures ; Computer security ; Information resources management Security measures ; Big data Security measures ; Big Data ; Datensicherung ; Big Data ; Datensicherung
    Abstract: The authors bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. --
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Waltham, MA : Syngress
    ISBN: 9780128010969 , 0128010967 , 0128008997 , 9780128008997
    Language: English
    Pages: 1 online resource (xvii, 262 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 363.28/9
    RVK:
    Keywords: HISTORY / Military / Other ; TECHNOLOGY & ENGINEERING / Military Science ; Computer security ; Private security services / Management ; Security systems / Management ; Computer Security ; Computer security ; Private security services Management ; Security systems Management ; Computersicherheit ; Unternehmen ; Unternehmen ; Computersicherheit
    Abstract: Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Organizations need to be committed to defending their own assets and their customers' information. This book will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. It explains how to develop and build a security operations center; shows how to gather invaluable intelligence to protect your organization; helps you evaluate the pros and cons behind each decision during the SOC-building process. --
    Note: Includes index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Bielefeld : transcript-Verlag | Berlin : de Gruyter
    ISBN: 9783837630282
    Language: German
    Pages: 1 Online-Ressource (388 Seiten) , Illustrationen
    Series Statement: Digitale Gesellschaft
    DDC: 302.231
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Datenbank ; Big Data ; Medientheorie
    URL: Cover
    URL: OAPEN
    URL: Image  (Thumbnail cover image)
    URL: Image  (Thumbnail cover image)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    ISBN: 9783837625929
    Language: German
    Pages: 494 Seiten , Illustrationen, Diagramme , 23 cm
    Series Statement: Digitale Gesellschaft
    Parallel Title: Erscheint auch als Big Data
    DDC: 303.4833
    RVK:
    RVK:
    Keywords: Massendaten ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Informationsgesellschaft ; Sozialer Wandel ; Big Data ; Datenanalyse ; Internet ; Medientheorie ; Medienwissenschaft
    Note: Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    ISBN: 130645199X , 9781118608654 , 9781306451994
    Language: English
    Pages: Online-Ressource (224 pages)
    Parallel Title: Druckausg.
    Parallel Title: Druckausg. Hadnagy, Christopher Unmasking the social engineer
    DDC: 303.3/72
    RVK:
    Keywords: Christian sociology ; Social problems ; Computer hackers ; Computer security ; Social engineering ; Christian sociology ; Social problems ; Electronic books ; Electronic books ; Soziologie ; Körpersprache ; Datenschutz ; Soziologie ; Körpersprache ; Datenschutz
    Abstract: Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming. Clearly combines both the practical and technical aspects of social engineering securityReveals the various dirty tricks that scammers usePinpoints what to look for on the nonverbal side to detect the social engineer Sharing proven scientific methodology for reading, understanding, and deciphering non-verbal communications, Unmasking the Social Engineer arms readers with the knowledge needed to help protect their organizations.
    Abstract: Cover -- Title Page -- Copyright -- Contents -- Foreword -- Acknowledgments and Preface -- Introduction -- The Scholar and the Student -- Using This Book as a Social Engineer -- Part I Building the Foundation -- Chapter 1 What Is Nonverbal Communication? -- The Different Aspects of Nonverbal Communication -- Kinesics -- Proxemics -- Touch -- Eye Contact -- Olfactics -- Adornment -- Facial Expressions -- How to Use This Information -- Summary -- Chapter 2 What Is Social Engineering? -- Information Gathering -- Pretexting -- Elicitation -- Rapport -- Influence/Manipulation -- Framing -- Nonverbal Communications -- The Three Basic Forms of Social Engineering -- Become Phishers of Men -- When The Phone Is More Dangerous Than Malware -- I Am Not the Social Engineer You Are Looking For -- Using Social Engineering Skills -- The Good -- The Bad -- The Ugly -- Summary -- Part II Decoding the Language of the Body -- Chapter 3 Understanding the Language of the Hands -- Communicating with Your Hands -- Origin -- Coding -- Usage -- High-Confidence Hand Displays -- Low-Confidence and Stress Hand Displays -- Getting a Handle on the Hands -- Summary -- Chapter 4 The Torso, Legs, and Feet -- Legs and Feet -- Torso and Arms -- Summary -- Chapter 5 The Science Behind the Face -- Just the FACS -- What Is a Truth Wizard? -- Emotions versus Feelings -- Fear -- Surprise -- Sadness -- Contempt -- Disgust -- Anger -- Happiness -- Perfect Practice Makes Perfect -- Summary -- Chapter 6 Understanding Nonverbal Displays of Comfort and Discomfort -- Neck and Face Pacifying -- What to Watch For -- Mouth Covers -- What to Watch For -- Lips -- What to Watch For -- Eye Blocking -- What to Watch For -- Self-Comforting and Head Tilts -- What to Watch For -- Summary -- Part III Deciphering the Science -- Chapter 7 The Human Emotional Processor -- Introducing the Amygdala.
    Description / Table of Contents: Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments and Preface; Introduction; The Scholar and the Student; Using This Book as a Social Engineer; Part I Building the Foundation; Chapter 1 What Is Nonverbal Communication?; The Different Aspects of Nonverbal Communication; Kinesics; Proxemics; Touch; Eye Contact; Olfactics; Adornment; Facial Expressions; How to Use This Information; Summary; Chapter 2 What Is Social Engineering?; Information Gathering; Pretexting; Elicitation; Rapport; Influence/Manipulation; Framing; Nonverbal Communications
    Description / Table of Contents: The Three Basic Forms of Social EngineeringBecome Phishers of Men; When The Phone Is More Dangerous Than Malware; I Am Not the Social Engineer You Are Looking For; Using Social Engineering Skills; The Good; The Bad; The Ugly; Summary; Part II Decoding the Language of the Body; Chapter 3 Understanding the Language of the Hands; Communicating with Your Hands; Origin; Coding; Usage; High-Confidence Hand Displays; Low-Confidence and Stress Hand Displays; Getting a Handle on the Hands; Summary; Chapter 4 The Torso, Legs, and Feet; Legs and Feet; Torso and Arms; Summary
    Description / Table of Contents: Chapter 5 The Science Behind the FaceJust the FACS; What Is a Truth Wizard?; Emotions versus Feelings; Fear; Surprise; Sadness; Contempt; Disgust; Anger; Happiness; Perfect Practice Makes Perfect; Summary; Chapter 6 Understanding Nonverbal Displays of Comfort and Discomfort; Neck and Face Pacifying; What to Watch For; Mouth Covers; What to Watch For; Lips; What to Watch For; Eye Blocking; What to Watch For; Self-Comforting and Head Tilts; What to Watch For; Summary; Part III Deciphering the Science; Chapter 7 The Human Emotional Processor; Introducing the Amygdala
    Description / Table of Contents: How the Amygdala Processes InformationHijacking the Amygdala; Human See, Human Do; Reading Other People's Expressions; Your Own Emotional Content; Nonverbal Social Proof; Using Amygdala Hijacking as a Social Engineer; Summary; Chapter 8 The Nonverbal Side of Elicitation; Artificial Time Constraints; Sympathy/Assistance Themes; Ego Suspension; Ask How, When, and Why Questions; Conversational Signals; Action Unit 1: Inner Brow Raiser; Action Unit 2: Outer Brow Raiser; Action Unit 4: Brow Lowerer; Conversational Signals of Emotions; Breaking Down Conversational Signals; Batons; Underliner
    Description / Table of Contents: PunctuationQuestion Mark; Word Search; Nonverbal Conversational Signals; Conversational Signals as a Social Engineer; Summary; Part IV Putting It All Together; Chapter 9 Nonverbal Communication and the Human Being; Applying This Information as a Professional Social Engineer; Using This Book to Defend; Becoming a Critical Thinker; Summary; Index
    Note: Description based upon print version of record
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    ISBN: 3642403107 , 9783642403101
    Language: German
    Pages: XII, 224 Seiten , Illustrationen , 240 mm x 168 mm
    Series Statement: Springer-Lehrbuch
    Parallel Title: Online-Ausg. Wollschläger, Daniel, 1976 - R kompakt
    RVK:
    Keywords: Social sciences Statistical methods ; Computer programs ; R (Computer program language) ; Statistics Computer programs ; Datenanalyse ; R
    Note: Literatur- und URL-Verz. S. 207 - 211
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    ISBN: 9781597499644 , 1597499641
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    DDC: 005.13/3
    RVK:
    Keywords: Python (Computer program language) ; Computer security ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices Data-mine popular social media websites and evade modern anti-virus
    Note: Includes bibliographical references and index. - Description based on online resource; title from PDF title page (Safari, viewed Jan. 24, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    San Francisco : No Starch Press
    Language: English
    Pages: 1 online resource (xix, 299 p.) , ill.
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    RVK:
    Keywords: Computer networks ; Security measures ; Browsers (Computer programs) ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: In The Tangled Web , Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Language: English
    Pages: 1 online resource (xxvi, 716 p.) , ill.
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: Malware (Computer software) ; Computer security ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Book
    Book
    Wiesbaden :Springer VS,
    ISBN: 3-531-14792-7 , 978-3-531-14792-5
    Language: German
    Pages: 257 S. : , graph. Darst. ; , 210 mm x 148 mm.
    Edition: 1. Aufl.
    Series Statement: Datenanalyse mit SPSS für Fortgeschrittene 2
    Series Statement: Datenanalyse mit SPSS für Fortgeschrittene
    RVK:
    RVK:
    Keywords: Datenanalyse. ; SPSS. ; Multivariate Analyse. ; Lehrbuch ; Datenanalyse ; SPSS ; Multivariate Analyse ; SPSS
    Note: Literaturverz. S. [252] - 257
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Language: English
    Pages: 1 online resource (xxvi, 358 p.) , ill.
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    RVK:
    RVK:
    Keywords: Cloud computing ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support"--Resource description page.
    Note: Description based on print version record. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Indianapolis, Ind. : Wiley
    Language: English
    Pages: 1 online resource (xxv, 309 p.) , ill.
    Series Statement: Wrox professional guides
    Parallel Title: Erscheint auch als
    DDC: 005.268
    RVK:
    Keywords: Mac OS ; Cocoa (Application development environment) ; Object-oriented programming (Computer science) ; Computer security ; Electronic books ; local
    Abstract: The first comprehensive security resource for Mac and iPhone developers The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development. While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first comprehensive reference to Apple's application security frameworks and features Shows developers how to consider security throughout the lifecycle of a Cocoa application, including how Mac and iPhone security features work and how to leverage them Describes how to design, implement, and deploy secure Mac and iPhone software, covering how user configurations affect application security, the keychain feature, how to maximize filesystem security, how to write secure code, and much more Professional Cocoa Application Security arms Apple developers with essential information to help them create Mac and iPhone applications as secure as the operating system they run on.
    Note: Description based on print version record. - "Wrox programmer to programmer"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Amsterdam : Elsevier/Morgan Kaufmann
    ISBN: 9780080555881 , 0080555888
    Language: English
    Pages: 1 online resource (xxxvii, 537 pages) , illustrations
    Series Statement: Morgan Kaufmann series in networking
    Series Statement: Morgan Kaufmann series in computer security
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer networks / Security measures ; Computer networks / Reliability ; Computer security ; Computer networks / Reliability ; Computer networks / Security measures ; Computer security ; Security measures ; Reliability ; Computer networks / Security measures ; Computer security ; Computer networks / Reliability ; Computer networks / Security measures ; Computer networks / Reliability ; Computer networks ; Computer networks Security measures ; Computer networks Reliability ; Computer security ; Computersicherheit ; Rechnernetz ; Zuverlässigkeit ; Rechnernetz ; Zuverlässigkeit ; Computersicherheit
    Abstract: In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks
    Abstract: Printbegrænsninger: Der kan printes kapitelvis
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    San Francisco, Calif. : No Starch Press | Boston, Mass. :Safari Books Online
    ISBN: 9781593271442 , 1593271441
    Language: English
    Pages: x, 472 p , ill. , 23 cm. +
    Edition: 2nd ed.
    DDC: 005.8
    RVK:
    Keywords: Computer security ; Computer hackers ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Indianapolis, Ind. : Wiley Pub.
    Language: English
    Pages: 1 online resource (xl, 1040 p.) , ill.
    Edition: 2nd ed.
    Parallel Title: Erscheint auch als
    DDC: 005.1
    RVK:
    RVK:
    RVK:
    Keywords: Computer security ; Electronic data processing ; Distributed processing ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
    Note: Cover title. - Includes bibliographical references (p. 893-996) and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Book
    Book
    Los Angeles [u.a.] :SAGE Publ.,
    ISBN: 978-0-7619-4922-0 , 0-7619-4923-2 , 978-0-7619-4923-7
    Language: English
    Pages: XI, 288 S. : , Ill.
    Edition: 1. publ.
    DDC: 300.72
    RVK:
    RVK:
    RVK:
    Keywords: Kwalitatieve methoden ; Kwalitatieve methoden ; Qualitative Forschung ; Sociaal-wetenschappelijk onderzoek ; Sociaal-wetenschappelijk onderzoek ; Software ; Software ; Qualitative research Computer programs ; Qualitative Sozialforschung. ; Datenanalyse. ; Computerunterstütztes Verfahren. ; Software. ; Einführung ; Einführung ; Qualitative Sozialforschung ; Datenanalyse ; Computerunterstütztes Verfahren ; Qualitative Sozialforschung ; Computerunterstütztes Verfahren ; Software
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...