Narrow your search
Listing 11 - 20 of 29 << page
of 3
>>
Sort by

Book
China's evolving IT capabilities : cloud computing, network operations and cyber espionage
Author:
ISBN: 1629489441 9781629489445 9781629489353 1629489352 Year: 2014 Publisher: New York Nova Publishers


Book
Israel and the cyber threat : how the startup nation became a global cyber power
Authors: --- ---
ISBN: 019767772X 0197677746 Year: 2023 Publisher: New York, NY : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In 'Israel and the Cyber Threat', Charles D. Freilich, Matthew S. Cohen, and Gabi Siboni provide a detailed and comprehensive overview of Israeli's cyber strategy, tracing it from its origins to the present. They analyze Israel's defensive and offensive capabilities, both of which are prodigious, to offer insights into what other countries can learn from Israel's experience and actions. This book provides an in-depth look at the major actions Israel has taken in cyberspace and places them in the broader context to help readers understand state behaviour in cyberspace.


Book
Inaugural Section Special Issue : Key Topics and Future Perspectives in Natural Hazards Research
Author:
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book collects selected high-quality papers published in 2018–2020 to inaugurate the “Natural Hazards” Section of the Geosciences journal. The topics encompass: trends in publications at international level in the field of natural hazards research; the role of Big Data in natural disaster management; assessment of seismic risk through the understanding and quantification of its different components; climatic/hydro-meteorological hazards; and finally, the scientific analysis and disaster forensics of recent natural hazard events. The target audience includes not only specialists, but also graduate students who wish to approach the challenging, but also fascinating

Keywords

Research & information: general --- big data --- disaster management --- review --- natural hazards --- disaster --- scientometrics --- bibliometrics --- citation analysis --- NatCatSERVICE --- Sigma Explorer --- Oroville Dam --- spillway --- incident --- flood control --- flood-frequency analysis --- dam operation --- drought --- impacts --- exposure --- vulnerability --- risk --- policy --- risk assessment --- earthquake risk --- energy security --- reliability of power supply --- Eurasian Economic Union (EAEU) --- integration process --- common electricity market --- masonry aggregates --- vulnerability assessment --- vulnerability curves --- damage scenarios --- local hazard effect --- psychological representation of earthquakes --- open-ended and closed-questions surveys --- children --- seismic hazard assessment --- emotions --- emotional prevention --- African easterly wave --- attractor coexistence --- chaos --- hurricane --- limit cycle --- Lorenz model --- predictability --- recurrence --- extended range weather prediction --- Jakarta basin --- site effects --- shear-wave velocity --- urban fabrics --- seismic vulnerability --- critic analysis --- cost modelling --- urban preservation programming --- building works programming --- natural hazard --- earthquake --- dam spillway --- psychology --- cyber-infrastructure --- big data --- disaster management --- review --- natural hazards --- disaster --- scientometrics --- bibliometrics --- citation analysis --- NatCatSERVICE --- Sigma Explorer --- Oroville Dam --- spillway --- incident --- flood control --- flood-frequency analysis --- dam operation --- drought --- impacts --- exposure --- vulnerability --- risk --- policy --- risk assessment --- earthquake risk --- energy security --- reliability of power supply --- Eurasian Economic Union (EAEU) --- integration process --- common electricity market --- masonry aggregates --- vulnerability assessment --- vulnerability curves --- damage scenarios --- local hazard effect --- psychological representation of earthquakes --- open-ended and closed-questions surveys --- children --- seismic hazard assessment --- emotions --- emotional prevention --- African easterly wave --- attractor coexistence --- chaos --- hurricane --- limit cycle --- Lorenz model --- predictability --- recurrence --- extended range weather prediction --- Jakarta basin --- site effects --- shear-wave velocity --- urban fabrics --- seismic vulnerability --- critic analysis --- cost modelling --- urban preservation programming --- building works programming --- natural hazard --- earthquake --- dam spillway --- psychology --- cyber-infrastructure


Book
Propagation of Interval and Probabilistic Uncertainty in Cyberinfrastructure-related Data Processing and Data Fusion
Authors: ---
ISBN: 9783319126289 331912627X 9783319126272 3319126288 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

On various examples ranging from geosciences to environmental sciences, this book explains how to generate an adequate description of uncertainty, how to justify semiheuristic algorithms for processing uncertainty, and how to make these algorithms more computationally efficient. It explains in what sense the existing approach to uncertainty as a combination of random and systematic components is only an approximation, presents a more adequate three-component model with an additional periodic error component, and explains how uncertainty propagation techniques can be extended to this model. The book provides a justification for a practically efficient heuristic technique (based on fuzzy decision-making). It explains how the computational complexity of uncertainty processing can be reduced. The book also shows how to take into account that in real life, the information about uncertainty is often only partially known, and, on several practical examples, explains how to extract the missing information about uncertainty from the available data.


Book
e-Infrastructure and e-Services for Developing Countries : 4th International ICST Conference, AFRICOMM 2012, Yaounde, Cameroon, November 12-14, 2012, Revised Selected Papers
Authors: --- ---
ISBN: 3642411770 3642411789 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2012, held in Yaounde, Cameroon, in November 2012. The 24 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics in the field of information and communication infrastructures and are grouped in topical sections on: e-Infrastructure, e-Services, e-Society, e-Health, and e-Security.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computers and civilization. --- Computer Science. --- Computers and Society. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer networks --- Information technology --- Cyberinfrastructure --- Wireless communication systems --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Computer systems --- Distributed databases --- High performance computing --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Distributed processing --- Informatics --- Science --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization


Book
Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles
Authors: --- ---
ISBN: 083309338X 0833089005 9780833093387 9780833089007 Year: 2015 Publisher: [Place of publication not identified] : Rand Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Provided by publisher.

Keywords

Computer networks --- Cyberinfrastructure --- Cyberspace --- Risk assessment --- Cyberterrorism --- National security --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures --- Evaluation --- Prevention --- Computer security --- National security policy --- NSP (National security policy) --- Security policy, National --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Analysis, Risk --- Assessment, Risk --- Risk analysis --- Risk evaluation --- Cyber-based information systems --- Cyber-infrastructure --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Government policy --- Economic policy --- International relations --- Military policy --- Computer crimes --- Terrorism --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Distributed processing --- Electronic terrorism (Cyberterrorism) --- United States. --- Rules and practice. --- AF (Air force) --- Air Force (U.S.) --- U.S.A.F. (Air force) --- United States Air Force --- US Air Force --- USAF (Air force)


Book
Knowledge machines : digital transformations of the sciences and humanities
Authors: ---
ISBN: 9780262028745 9780262328180 0262028743 0262328186 0262328194 Year: 2015 Publisher: Cambridge, Massachusetts : The MIT Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In Knowledge Machines, Eric Meyer and Ralph Schroeder argue that digital technologies have fundamentally changed research practices in the sciences, social sciences, and humanities. Meyer and Schroeder show that digital tools and data, used collectively and in distributed mode -- which they term e-research -- have transformed not just the consumption of knowledge but also the production of knowledge. Digital technologies for research are reshaping how knowledge advances in disciplines that range from physics to literary analysis. Meyer and Schroeder map the rise of digital research and offer case studies from many fields, including biomedicine, social science uses of the Web, astronomy, and large-scale textual analysis in the humanities. They consider such topics as the challenges of sharing research data and of big data approaches, disciplinary differences and new forms of interdisciplinary collaboration, the shifting boundaries between researchers and their publics, and the ways that digital tools promote openness in science.This book considers the transformations of research from a number of perspectives, drawing especially on the sociology of science and technology and social informatics. It shows that the use of digital tools and data is not just a technical issue; it affects research practices, collaboration models, publishing choices, and even the kinds of research and research questions scholars choose to pursue. Knowledge Machines examines the nature and implications of these transformations for scholarly research.


Book
Quantitative Security Risk Assessment of Enterprise Networks
Authors: ---
ISBN: 1461418593 1461418607 Year: 2011 Publisher: New York, NY : Springer New York : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as “are we more secure than yesterday” or “how does the security of one network configuration compare with another one”. In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring System (CVSS). Our techniques analyze all attack paths through a network, for an attacker to reach certain goal(s).

Keywords

Computer networks --- Cyberinfrastructure --- Cyber-based information systems --- Cyber-infrastructure --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures. --- Risk assessment --- Methodology. --- Computer science. --- Computer software --- Computer communication systems. --- Computer system failures. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Performance and Reliability. --- System Performance and Evaluation. --- Reusability. --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Computer security --- Distributed processing --- Operating systems (Computers). --- Computer system performance. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Operating systems --- Protection --- Security measures --- Computer software—Reusability. --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Failures


Book
Cyber-Physical Security : Protecting Critical Infrastructure at the State and Local Level
Authors: ---
ISBN: 3319328247 3319328220 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book focuses on the vulnerabilities of state and local services to cyber-threats and suggests possible protective action that might be taken against such threats. Cyber-threats to U.S. critical infrastructure are of growing concern to policymakers, managers and consumers. Information and communications technology (ICT) is ubiquitous and many ICT devices and other components are interdependent; therefore, disruption of one component may have a negative, cascading effect on others. Cyber-attacks might include denial of service, theft or manipulation of data. Damage to critical infrastructure through a cyber-based attack could have a significant impact on the national security, the economy, and the livelihood and safety of many individual citizens. Traditionally cyber security has generally been viewed as being focused on higher level threats such as those against the internet or the Federal government. Little attention has been paid to cyber-security at the state and local level. However, these governmental units play a critical role in providing services to local residents and consequently are highly vulnerable to cyber-threats. The failure of these services, such as waste water collection and water supply, transportation, public safety, utility services, and communication services, would pose a great threat to the public. Featuring contributions from leading experts in the field, this volume is intended for state and local government officials and managers, state and Federal officials, academics, and public policy specialists.

Keywords

Cyberinfrastructure --- Security measures. --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Distributed processing --- Political science. --- Environmental pollution. --- Political Science. --- Waste Water Technology / Water Pollution Control / Water Management / Aquatic Pollution. --- Transportation. --- Chemical pollution --- Chemicals --- Contamination of environment --- Environmental pollution --- Pollution --- Contamination (Technology) --- Asbestos abatement --- Bioremediation --- Environmental engineering --- Environmental quality --- Factory and trade waste --- Hazardous waste site remediation --- Hazardous wastes --- In situ remediation --- Lead abatement --- Pollutants --- Refuse and refuse disposal --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- Social sciences --- State, The --- Environmental aspects --- Water pollution. --- Public transportation --- Transport --- Transportation --- Transportation, Primitive --- Transportation companies --- Transportation industry --- Locomotion --- Commerce --- Communication and traffic --- Storage and moving trade --- Aquatic pollution --- Fresh water --- Fresh water pollution --- Freshwater pollution --- Inland water pollution --- Lake pollution --- Lakes --- Reservoirs --- River pollution --- Rivers --- Stream pollution --- Water contamination --- Water pollutants --- Water pollution --- Waste disposal in rivers, lakes, etc. --- Economic aspects


Book
Inaugural Section Special Issue : Key Topics and Future Perspectives in Natural Hazards Research
Author:
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book collects selected high-quality papers published in 2018–2020 to inaugurate the “Natural Hazards” Section of the Geosciences journal. The topics encompass: trends in publications at international level in the field of natural hazards research; the role of Big Data in natural disaster management; assessment of seismic risk through the understanding and quantification of its different components; climatic/hydro-meteorological hazards; and finally, the scientific analysis and disaster forensics of recent natural hazard events. The target audience includes not only specialists, but also graduate students who wish to approach the challenging, but also fascinating

Listing 11 - 20 of 29 << page
of 3
>>
Sort by