Listing 1 - 10 of 51 | << page >> |
Sort by
|
Choose an application
Computer science --- Programming --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- DES (data encryption standard) --- cryptologie --- computerbesturingssystemen --- programmeren (informatica) --- informatiesystemen --- software engineering --- programmatielogica
Choose an application
Computer security --- Computers --- Access control
Choose an application
Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics. Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information. Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.
Information technology --- Computer security --- Computer-assisted instruction --- Management. --- Security measures. --- Computer science. --- Software engineering. --- Computer programming. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Information Systems Applications (incl. Internet). --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Programming Techniques. --- Software Engineering. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer software engineering --- Engineering --- Informatics --- Science --- Programming --- CAI (Computer-assisted instruction) --- Computer-aided instruction --- Computer-assisted learning --- Computer based instruction --- Computer-enhanced learning --- Electronic data processing in programmed instruction --- ILSs (Integrated learning systems) --- Integrated learning systems --- Microcomputer-aided instruction --- Microcomputer-assisted instruction --- Microcomputer-assisted learning --- Microcomputer-based instruction --- Teaching --- Education --- Educational technology --- Programmed instruction --- Telematics --- Data processing --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics. Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information. Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.
Computer science --- Programming --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- DES (data encryption standard) --- cryptologie --- computerbesturingssystemen --- programmeren (informatica) --- informatiesystemen --- software engineering --- programmatielogica
Choose an application
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer
Choose an application
This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers, France, in February 2015. The 12 papers presented in this volume were carefully reviewed and selection from a total of 56 submissions. They were organized in topical sections named: data and software security; privacy and confidentiality; mobile systems security; and biometric authentication. The book also contains two invited papers. .
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Information Systems. --- Computer networks --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security. .
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer
Choose an application
This book constitutes the refereed proceedings of the IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference for Machine Learning and Knowledge Extraction, CD-MAKE 2017, held in Reggio, Italy, in August/September 2017. The 24 revised full papers presented were carefully reviewed and selected for inclusion in this volume. The papers deal with fundamental questions and theoretical aspects and cover a wide range of topics in the field of machine learning and knowledge extraction. They are organized in the following topical sections: MAKE topology; MAKE smart factory; MAKE privacy; MAKE VIS; MAKE AAL; and MAKE semantics.
Computer science. --- Computer communication systems. --- Computer security. --- Coding theory. --- Artificial intelligence. --- Computers and civilization. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Artificial Intelligence (incl. Robotics). --- Coding and Information Theory. --- Computer Communication Networks. --- Systems and Data Security. --- Computers and Society. --- Civilization and computers --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Civilization --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Science --- Distributed processing --- Artificial Intelligence. --- Computer networks. --- Application software. --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference for Machine Learning and Knowledge Extraction, CD-MAKE 2018, held in Hamburg, Germany, in September 2018. The 25 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are clustered under the following topical sections: MAKE-Main Track, MAKE-Text, MAKE-Smart Factory, MAKE-Topology, and MAKE Explainable AI. .
Artificial intelligence. --- Natural language processing (Computer science). --- Data mining. --- Social sciences --- Artificial Intelligence. --- Natural Language Processing (NLP). --- Data Mining and Knowledge Discovery. --- Computer Appl. in Social and Behavioral Sciences. --- Data processing. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- NLP (Computer science) --- Artificial intelligence --- Electronic data processing --- Human-computer interaction --- Semantic computing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Machine learning --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.
Computer science. --- Computer security. --- Algorithms. --- Biometrics (Biology). --- Computer Science. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Biometrics. --- Algorithm Analysis and Problem Complexity. --- Computer software. --- Software, Computer --- Computer systems --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Informatics --- Science --- Application software. --- Algorism --- Algebra --- Arithmetic --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Foundations --- Statistical methods
Listing 1 - 10 of 51 | << page >> |
Sort by
|