Listing 1 - 10 of 17 | << page >> |
Sort by
|
Choose an application
This book discusses cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. It presents the most current research on cloud security from a multi-disciplinary standpoint focusing on technical, legal, and business management issues involved in implementing effective cloud security, including case examples. Other topics include: cloud trust protocols; cryptographic deployment; mobile devices and BYOD security management; auditability and accountability; emergency and incident response; cloud forensics; cloud data governance; mitigation and liability of international cloud deployment; legal boundaries; risk management; cloud information security management plans; economics of cloud security; standardization efforts. --
Choose an application
This book highlights the challenges and potential of educational learning or industry-based training using serious games and social media platforms. In particular, the book addresses applications used in businesses and education-related organizations in Asia, where the framework and experience of serious games have been used to address specific problems in the real world. The topics that will be present in this book includes future of serious games and immersive technologies and their impact on society; online and mobile games; achievement systems in serious games; persuasive technology and games for saving and money management; malware analytics for social networking; serious games for mental health interventions; educational implications of social network games; learning and acquiring subject knowledge using serious games in classrooms. The target audience for this book includes scientists, engineers and practitioners involved in the field of Serious Games. The major part of this book comprises of papers that have been presented at the Serious Games and Social Connect 2012 conference held in Singapore (October 4, 2012). All the contributions have been peer reviewed and by scientific committee members with report about quality, content and originality.
Engineering. --- User interfaces (Computer systems). --- Educational technology. --- Computational intelligence. --- Mass media. --- Communication. --- Social sciences in mass media. --- Computational Intelligence. --- User Interfaces and Human Computer Interaction. --- Educational Technology. --- Media Sociology. --- Mass media --- Communication, Primitive --- Mass communication --- Sociology --- Media, Mass --- Media, The --- Communication --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Instructional technology --- Technology in education --- Technology --- Educational innovations --- Instructional systems --- Teaching --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Construction --- Industrial arts --- Aids and devices --- Computer games --- Electronic games --- Design --- Social aspects. --- Electronic toys --- Games --- Application software --- Computer science. --- Education. --- Children --- Education, Primitive --- Education of children --- Human resource development --- Instruction --- Pedagogy --- Schooling --- Students --- Youth --- Civilization --- Learning and scholarship --- Mental discipline --- Schools --- Training --- Informatics --- Science --- Education
Choose an application
Cloud computing --- Electronic data processing --- Web services --- Security measures. --- Distributed processing
Choose an application
This book highlights the challenges and potential of educational learning or industry-based training using serious games and social media platforms. In particular, the book addresses applications used in businesses and education-related organizations in Asia, where the framework and experience of serious games have been used to address specific problems in the real world. The topics that will be present in this book includes future of serious games and immersive technologies and their impact on society; online and mobile games; achievement systems in serious games; persuasive technology and games for saving and money management; malware analytics for social networking; serious games for mental health interventions; educational implications of social network games; learning and acquiring subject knowledge using serious games in classrooms. The target audience for this book includes scientists, engineers and practitioners involved in the field of Serious Games. The major part of this book comprises of papers that have been presented at the Serious Games and Social Connect 2012 conference held in Singapore (October 4, 2012). All the contributions have been peer reviewed and by scientific committee members with report about quality, content and originality.
Computer assisted instruction --- Audiovisual methods --- Teaching --- Applied physical engineering --- Computer science --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- neuronale netwerken --- fuzzy logic --- cybernetica --- onderwijstechnologie --- sociale media --- mobiele netwerken --- serious games --- computers --- informatica --- onderwijs --- computerondersteund onderwijs --- KI (kunstmatige intelligentie) --- ingenieurswetenschappen --- computerkunde --- AI (artificiële intelligentie)
Choose an application
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following workshops: Second International Workshop on Security in Self-Organising Networks (Self Net 2014); Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014); Second International Workshop on Trust and Privacy in Cyberspace (Cyber Trust 2014).
Computer science --- Computer architecture. Operating systems --- Computer. Automation --- VR (virtual reality) --- DES (data encryption standard) --- cryptologie --- computers --- informatica --- multimedia --- computerbeveiliging --- computernetwerken --- computerkunde
Choose an application
This book constitutes the refereed proceedings of the 16th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2016, held in Granada, Spain, in December 2016. The 30 full papers and 22 short papers presented were carefully reviewed and selected from 117 submissions. They cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems trying to push beyond the limits of existing technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing parallel processing technology.
Computer science. --- Computer communication systems. --- Computer programming. --- Software engineering. --- Computers. --- Algorithms. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Software Engineering. --- Programming Techniques. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computation by Abstract Devices. --- Algorism --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer software engineering --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Programming --- Algebra --- Arithmetic --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Science --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Engineering --- Coding theory --- Foundations --- Distributed processing --- Computer software. --- Software, Computer --- Parallel processing (Electronic computers) --- Computer algorithms --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Computer and Information Systems Applications. --- Theory of Computation.
Choose an application
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following workshops: Second International Workshop on Security in Self-Organising Networks (Self Net 2014); Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014); Second International Workshop on Trust and Privacy in Cyberspace (Cyber Trust 2014).
Computer science. --- Computer Communication Networks. --- Data protection. --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer networks --- Data encryption (Computer science) --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Computer communication systems. --- Computer security. --- Cryptology. --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Computer networks.
Choose an application
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security. Presents the most current and leading-edge research on cloud security from a multi-disciplinary standpoint, featuring a panel of top experts in the field Focuses on the technical, legal, and business management issues involved in implementing effective cloud security, including case examples Covers key technical topics, including cloud trust protocols, cryptographic deployment and key management, mobile devices and BYOD security management, auditability and accountability, emergency and incident response, as well as cloud forensics Includes coverage of management and legal issues such as cloud data governance, mitigation and liability of international cloud deployment, legal boundaries, risk management, cloud information security management plans, economics of cloud security, and standardization efforts
Electronic data processing departments --- Electronic data processing --- Internet --- Networking --- Security measures. --- Distributed processing. --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks --- Computer department security measures --- Data protection
Choose an application
This book constitutes the refereed proceedings of the 7th International Symposium on Security in Computing and Communications, SSCC 2019, held in Trivandrum, India, in December 2019. The 22 revised full papers and 7 revised short papers presented were carefully reviewed and selected from 61 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.
Computer security --- Data encryption (Computer science). --- Application software. --- Computer communication systems. --- Computer security. --- Computer networks --- Computers. --- Cryptology. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Systems and Data Security. --- Mobile and Network Security. --- Computing Milieux. --- Security measures. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Distributed processing --- Protection --- Security measures
Choose an application
Programming --- Computer architecture. Operating systems --- Computer. Automation --- applicatiebeheer --- apps --- computers --- informatica --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- netwerk management
Listing 1 - 10 of 17 | << page >> |
Sort by
|