Listing 1 - 6 of 6 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linköping University, Sweden, and held online during November 23-24, 2020. The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
Computer security. --- Application software. --- Computers. --- Law and legislation. --- Computer communication systems. --- Computer networks --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Legal Aspects of Computing. --- Computer Communication Networks. --- Mobile and Network Security. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures
Choose an application
No detailed description available for "Contemporary Megaprojects".
Choose an application
Contemporary megaprojects have evolved from the discreet, modernist projects undertaken in the past by centralized authorities to encompass everything from large-scale construction to space exploration. Contemporary Megaprojects explores how these projects have been impacted by cutting-edge technology, the private sector, and the processes of decentralization and dematerialization. With case studies ranging from mega-plantations in Southeast Asia to ocean mapping to sports events, the contributions in this collected volume demonstrate the increasing ambition and pervasiveness of these projects, as well as their significant impact on both society and the environment.
Choose an application
No detailed description available for "Contemporary Megaprojects".
Political sociology --- Politics --- E-books --- Project management --- Engineering --- Economic development projects. --- Social aspects. --- Management
Choose an application
This book explores the ways in which communities are responding to today's society as government policies are increasingly promoting privatisation, deregulation and individualisation of responsibilities, providing insights into the efficacy of these approaches through key policy issues including access to food, education and health.
Community and college --- Community development --- Great Britain --- Social policy --- Regional development --- Economic assistance, Domestic --- Social planning --- College and community --- Town and gown --- University and community --- Universities and colleges --- University towns --- Citizen participation --- Government policy --- Civil society --- History --- Economic conditions
Choose an application
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linköping University, Sweden, and held online during November 23-24, 2020. The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- applicatiebeheer --- apps --- netwerken (informatica) --- computerbeveiliging --- computercriminaliteit --- computernetwerken --- architectuur (informatica) --- mobiele communicatie
Listing 1 - 6 of 6 |
Sort by
|