Listing 1 - 5 of 5 |
Sort by
|
Choose an application
This unique introduction to the foundational concepts of cyber-physical systems (CPS) describes key design principles and emerging research trends in detail. Several interdisciplinary applications are covered, with a focus on the wide-area management of infrastructures including electric power systems, air transportation networks, and health care systems. Design, control and optimization of cyber-physical infrastructures are discussed, addressing security and privacy issues of networked CPS, presenting graph-theoretic and numerical approaches to CPS evaluation and monitoring, and providing readers with the knowledge needed to operate CPS in a reliable, efficient, and secure manner. Exercises are included. This is an ideal resource for researchers and graduate students in electrical engineering and computer science, as well as for practitioners using cyber-physical systems in aerospace and automotive engineering, medical technology, and large-scale infrastructure operations.
Cooperating objects (Computer systems) --- Automation. --- Automatic factories --- Automatic production --- Computer control --- Engineering cybernetics --- Factories --- Industrial engineering --- Mechanization --- Assembly-line methods --- Automatic control --- Automatic machinery --- CAD/CAM systems --- Robotics --- Automation --- Automatització. --- Objectes cooperants (Sistemes informàtics)
Choose an application
This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security – including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is “elementary” in that it assumes no background in security, but unlike “soft” high-level texts it does not avoid low-level details, instead it selectively dives into fine points for exemplary topics to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology.
Computer security. --- Internet --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- System safety. --- Computer organization. --- Electrical engineering. --- Application software. --- Systems and Data Security. --- Security Science and Technology. --- Computer Systems Organization and Communication Networks. --- Communications Engineering, Networks. --- Information Systems Applications (incl. Internet). --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Electric engineering --- Engineering --- Organization, Computer --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Prevention --- Seguretat informàtica. --- Ordinadors --- Disseny i funcionament. --- Informàtica --- Seguretat dels sistemes informàtics --- Sistemes informàtics --- Protecció de dades --- Sistemes de seguretat --- Concepció i construcció --- Mesures de seguretat
Choose an application
Computers --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer science --- computer science --- information processing --- computing --- Ordinadors. --- Computadores digitals --- Hardware --- Hardware d'ordinadors --- Hardware (Informàtica) --- Maquinari --- Màquines de calcular digitals --- Ordinadors automàtics digitals --- Ordinadors digitals --- Ordinadors digitals electrònics --- Ordinadors electrònics --- Ordinadors electrònics digitals --- Cibernètica --- Indústria informàtica --- Sistemes informàtics --- Art per ordinador --- Infografia --- Miniordinadors --- Multiprocessadors --- Ordinadors analògics --- Ordinadors híbrids --- Ordinadors moleculars --- Ordinadors paral·lels --- Ordinadors quàntics --- Organització d'ordinadors --- Processament del so per ordinador --- Ciberespai --- Programari --- Sistemes d'informació --- Ordinadors
Choose an application
machine learning --- artificial intelligence --- computational physics --- reinforcement learning --- neural networks --- applied algorithms --- Machine learning --- Learning, Machine --- Artificial intelligence --- Machine theory --- Informàtica. --- Processament de dades. --- Revistes electròniques. --- Revistes digitals --- Revistes en línia --- Revistes on line --- Revistes per Internet --- Publicacions electròniques --- Revistes --- Processament de dades electròniques --- Processament automàtic de dades --- Processament electrònic de dades --- Processament integrat de dades --- Sistematització de dades (Ordinadors) --- Tractament de dades --- Tractament electrònic de dades --- Tractament integrat de dades --- Automatització --- Informàtica --- Complexitat computacional --- Curació de dades --- Depuració (Informàtica) --- Estructures de dades (Informàtica) --- Gestió de bases de dades --- Informàtica mòbil --- Informàtica recreativa --- Intel·ligència artificial --- Sistemes en línia --- Temps real (Informàtica) --- Tractament del llenguatge natural (Informàtica) --- Processament òptic de dades --- Protecció de dades --- Transmissió de dades --- Tolerància als errors (Informàtica) --- Enginyeria --- Càlcul intensiu (Informàtica) --- Disseny de sistemes --- Història de la informàtica --- Geometria computacional --- Informàtica tova --- Processament de dades --- Programació (Ordinadors) --- Sistemes informàtics --- Teledocumentació --- Automatització d'arxius --- Automatització de biblioteques --- Automatització de museus --- Indústria informàtica --- Teoria de la informació --- Machine learning.
Choose an application
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.
Data protection. --- Computer organization. --- Artificial intelligence. --- Computers. --- Security. --- Computer Systems Organization and Communication Networks. --- Artificial Intelligence. --- Information Systems and Communication Service. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Organization, Computer --- Electronic digital computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Big data --- Security measures. --- Data sets, Large --- Large data sets --- Data sets --- Seguretat informàtica --- Dades massives --- Protecció de dades --- Intel·ligència artificial --- Ciència cognitiva --- Mètodes de simulació --- Processament de dades --- Sistemes autoorganitzatius --- Aprenentatge automàtic --- Demostració automàtica de teoremes --- Intel·ligència artificial distribuïda --- Intel·ligència computacional --- Sistemes adaptatius --- Tractament del llenguatge natural (Informàtica) --- Raonament qualitatiu --- Representació del coneixement (Teoria de la informació) --- Sistemes de pregunta i resposta --- Traducció automàtica --- Visió per ordinador --- Xarxes neuronals (Informàtica) --- Xarxes semàntiques (Teoria de la informació) --- Agents intel·ligents (Programes d'ordinador) --- Programació per restriccions --- Vida artificial --- Protecció de dades personals --- Protecció de la informació (Informàtica) --- Regulació de dades --- Xifratge (Informàtica) --- Delegats de protecció de dades --- Dret a l'oblit --- Identitat digital --- Macrodades --- Bases de dades --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Sistemes de seguretat --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Pirates informàtics --- Intel·ligència artificial.
Listing 1 - 5 of 5 |
Sort by
|