Listing 1 - 8 of 8 |
Sort by
|
Choose an application
"An introduction to the major concepts in cybersecurity that includes case examples and tips for individuals to protect themselves"--
Computer security --- Internet --- Computer networks --- Data protection --- Computer Security --- Electronic data processing --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer network security --- Network security, Computer --- Security of computer networks --- Security systems --- Hacking --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Security measures --- Protection
Choose an application
"Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic. In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things ; Who the attackers are - from nation states and business competitors through criminal gangs to stalkers and playground bullies ; What they do - from phishing and carding through SIM swapping and software exploits to DDoS and fake news ; Security psychology, from privacy through ease-of-use to deception ; The economics of security and dependability - why companies build vulnerable systems and governments look the other way ; How dozens of industries went online - well or badly ; How to manage security and safety engineering in a world of agile development - from reliability engineering to DevSecOps. The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?" [Publisher's website]
Computer security --- Electronic data processing --- Computer Security --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Cybersecurity --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures --- Computer security. --- Systèmes informatiques --- Chiffrement (informatique). --- Distributed processing. --- Mesures de sûreté.
Choose an application
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions, and networking services. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.
Electrical Engineering --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Embedded computer systems --- Computer security. --- Data encryption (Computer science) --- Security measures. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Embedded systems (Computer systems) --- Security measures --- Protection of computer systems --- Protection --- Engineering. --- Electronics. --- Microelectronics. --- Electronic circuits. --- Circuits and Systems. --- Systems and Data Security. --- Electronics and Microelectronics, Instrumentation. --- Data protection --- Security systems --- Hacking --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Electrical engineering --- Physical sciences --- Construction --- Industrial arts --- Technology --- Computer security --- Cryptography --- Architecture Analysis and Design Language --- Systems engineering. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Computer Security --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer
Choose an application
Medical telematics --- Data protection --- Telecommunication in medicine --- Computer Communication Networks. --- Computer Security. --- Telemedicine. --- Medical Records Systems, Computerized. --- -Medical telematics --- -Telecommunication in medicine --- -Telecare (Medicine) --- Telemedicine --- Medicine --- Clinical telematics --- Health telematics --- Telehealth --- Medical informatics --- Telematics --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Automated Medical Record System --- Automated Medical Record Systems --- Automated Medical Records System --- Computerized Medical Record --- Computerized Medical Record System --- Computerized Medical Record Systems --- Computerized Medical Records --- Computerized Medical Records System --- Computerized Patient Medical Records --- Medical Record System, Automated --- Medical Record System, Computerized --- Medical Record Systems, Automated --- Medical Record Systems, Computerized --- Medical Record, Computerized --- Medical Records System, Automated --- Medical Records System, Computerized --- Medical Records Systems, Automated --- Medical Records, Computerized --- Automated Medical Records Systems --- Computerized Medical Records Systems --- Record, Computerized Medical --- Records, Computerized Medical --- Forms and Records Control --- Mobile Health --- eHealth --- mHealth --- Health, Mobile --- Telemetry --- Compromising of Data --- Computer Hackers --- Computer Worms --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Hacker, Computer --- Hackers, Computer --- Protection, Information --- Security, Computer --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Computer Network Management --- Databases, Distributed --- Distributed Systems --- Extranets --- Intranets --- Network Communication Protocols --- Telecommunication Networks --- Communication Network, Computer --- Communication Networks, Computer --- Communication Protocol, Network --- Communication Protocols, Network --- Computer Communication Network --- Database, Distributed --- Distributed Database --- Distributed Databases --- Distributed System --- Extranet --- Intranet --- Management, Computer Network --- Network Communication Protocol --- Network Management, Computer --- Network, Computer Communication --- Network, Telecommunication --- Networks, Computer Communication --- Networks, Telecommunication --- Protocol, Network Communication --- Protocols, Network Communication --- System, Distributed --- Systems, Distributed --- Telecommunication Network --- Telecommunications --- Education, Distance --- Europe. --- Northern Europe --- Southern Europe --- Western Europe --- Cyber Security --- Cybersecurity --- Data Encryption --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Security, Cyber --- -Europe. --- Computer Communication Networks --- Computer Security --- Medical Records Systems, Computerized --- Telecare (Medicine) --- Europe --- Security measures --- Medical records --- Access control --- Tele-ICU --- Tele-Intensive Care --- Tele-Referral --- Virtual Medicine --- Medicine, Virtual --- Tele ICU --- Tele Intensive Care --- Tele Referral --- Tele-Referrals --- Medical telematics - Europe. --- Data protection - Europe. --- Telecommunication in medicine - Europe.
Choose an application
This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD). It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in Computer Science privacy research, as well as lightweight solutions appropriate for implementation in IMDs. · Describes problems of security and privacy in implantable medical devices and proposes technological solutions; · Includes basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures; · Provides state-of-the-art research of interest to a multidisciplinary audience in electrical, computer and bioengineering, computer networks and cryptography and medical and health sciences. .
Engineering. --- Data encryption (Computer science) --- Systems engineering. --- Biomedical engineering. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Clinical engineering --- Medical engineering --- Engineering systems --- System engineering --- Construction --- Design and construction --- Data encryption (Computer science). --- Electronic circuits. --- Circuits and Systems. --- Data Encryption. --- Biomedical Engineering. --- Engineering --- Industrial engineering --- System analysis --- Computer security --- Cryptography --- Bioengineering --- Biophysics --- Medicine --- Industrial arts --- Technology --- Cryptology. --- Biomedical Engineering and Bioengineering. --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Implants, Artificial --- Biomedical engineering --- Confidential communications --- Prostheses and Implants --- Computer Security --- Confidentiality --- Privacy --- Biomedical Technology --- Biomedical Technologies --- Technology, Biomedical --- Technology, Health --- Technology, Health Care --- Health Care Technology --- Health Technology --- Biomedical Engineering --- Medical Informatics --- PL 93-579 --- PL93-579 --- Privacy Act --- Public Law 93-579 --- Act, Privacy --- Law 93-579, Public --- PL 93 579 --- PL93 579 --- Public Law 93 579 --- Confidential Information --- Secrecy --- Patient Data Privacy --- Privacy of Patient Data --- Privileged Communication --- Communication, Privileged --- Communications, Privileged --- Data Privacy, Patient --- Information, Confidential --- Privacy, Patient Data --- Privileged Communications --- Duty to Warn --- Disclosure --- Anonymous Testing --- Parental Notification --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Cybersecurity --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Endoprostheses --- Endoprosthesis --- Prostheses --- Prosthetic Implants --- Prosthesis --- Artificial Implant --- Artificial Implants --- Implant, Artificial --- Implant, Prosthetic --- Implants and Prostheses --- Implants, Prosthetic --- Prosthetic Implant --- Prosthesis Retention --- Communications, Confidential --- Confidential relationships --- Privileged communications (Confidential communications) --- Professional secrets --- Secrets, Professional --- Confession --- Criminal law --- Evidence (Law) --- Objections (Evidence) --- Personality (Law) --- Professional ethics --- Privacy, Right of --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Artificial implants --- Implants, Surgical --- Surgical implants --- Biomedical materials --- Surgery --- Law and legislation --- Protection --- Security measures --- Implants, Artificial. --- Computer security.
Choose an application
A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology.Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare.A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today.
INTELLIGENCE SERVICE--USA --- CYBER INTELLIGENCE (COMPUTER SECURITY)--USA --- Polemology --- United States --- Intelligence service --- Cyber intelligence (Computer security) --- Terrorism --- Public-private sector cooperation --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Government policy --- Abuse of authority. --- Al-Qaeda. --- Assassination. --- Atomic spies. --- Bribery. --- Bureau of Intelligence and Research. --- CIA Counterintelligence. --- Central Intelligence Agency. --- Circumstantial evidence. --- Clandestine HUMINT. --- Clandestine cell system. --- Classified information. --- Computer worm. --- Confirmation bias. --- Conspiracy theory. --- Counter-insurgency. --- Counter-terrorism. --- Counterintelligence. --- Counterterrorism Center. --- Covert operation. --- Cryptanalysis. --- Cryptography. --- Cyber threat intelligence. --- Cyber-attack. --- Demagogue. --- Denial and deception. --- Denial-of-service attack. --- Deterrence theory. --- Director of Central Intelligence. --- Director of National Intelligence. --- Director of the Central Intelligence Agency. --- Disinformation. --- Double agent. --- Drug lord. --- Electoral fraud. --- Encryption. --- Espionage. --- Fabricator (intelligence). --- Fake Claims. --- Generative Adversarial Networks. --- Hacking tool. --- Identity theft. --- Imminent Threat. --- Information asymmetry. --- Information overload. --- Information warfare. --- Insider threat. --- Insurgency. --- Intelligence Authorization Act. --- Intelligence Reform and Terrorism Prevention Act. --- Intelligence agency. --- Intelligence analysis. --- Intelligence officer. --- Iran–Contra affair. --- Jihadism. --- KGB. --- Lie detection. --- MafiaBoy. --- Malware. --- Mole (espionage). --- Mossad. --- NSA warrantless surveillance (2001–07). --- National Security Archive. --- National security. --- Nuclear warfare. --- On Intelligence. --- Osama bin Laden. --- Palmer Raids. --- Persecution. --- Policy. --- Political corruption. --- Political crime. --- Political repression. --- Rogue state. --- Sabotage. --- Sanctions against Iran. --- Secret Intelligence Service. --- Security agency. --- Sensitive Compartmented Information. --- Smuggling. --- Spy fiction. --- Spycatcher. --- Spymaster. --- State secrets privilege. --- Stuxnet. --- Subversion. --- Targeted killing. --- Terrorism. --- The Shadow Factory. --- Theft. --- Think Secret. --- Top Secret America. --- Trade secret. --- Undercover operation. --- United States Intelligence Community. --- United States State Department list of Foreign Terrorist Organizations. --- Vulnerability (computing). --- Warfare. --- Watergate scandal. --- Weapon of mass destruction. --- Intelligence service - United States --- Terrorism - Government policy - United States --- Public-private sector cooperation - United States --- Cyber intelligence (Computer security) - United States --- United States of America
Choose an application
The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain costs while maximizing quality and efficiency. However, ICT adoption for healthcare information management has brought far-reaching effects and implications on the spirit of the Hippocratic Oath, patient privacy and confidentiality. A wave of security breaches have led to pressing calls for opt-in and opt-out provisions where patients are free to choose to or not have their healthcare information collected and recorded within healthcare information systems. Such provisions have negative impact on cost, efficiency and quality of patient care. Thus determined efforts to gain patient trust is increasingly under consideration for enforcement through legislation, standards, national policy frameworks and implementation systems geared towards closing gaps in ICT security frameworks. The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency in patient care services are driving innovation in healthcare information management. Key among the main innovations is the introduction of new healthcare practice concepts such as shared care, evidence-based medicine, clinical practice guidelines and protocols, the cradle-to-grave health record and clinical workflow or careflow. Central to these organizational re-engineering innovations is the widespread adoption of Information and Communication Technologies (ICT) at national and regional levels, which has ushered in computer-based healthcare information management that is centred on the electronic healthcare record (EHR).
Electronic books. -- local. --- Health services administration -- Data processing. --- Medical informatics. --- Medical Records Systems, Computerized --- Security Measures --- Information Science --- Medical Records --- Organization and Administration --- Health Services Administration --- Records as Topic --- Data Collection --- Health Care --- Epidemiologic Methods --- Investigative Techniques --- Analytical, Diagnostic and Therapeutic Techniques and Equipment --- Computer Security --- Electronic Health Records --- Medicine --- Engineering & Applied Sciences --- Health & Biological Sciences --- Medical & Biomedical Informatics --- Computer Science --- Electronic Health Record --- Electronic Medical Record --- Electronic Medical Records --- Health Record, Electronic --- Health Records, Electronic --- Medical Record, Electronic --- Medical Records, Electronic --- Record, Electronic Health --- Record, Electronic Medical --- Records, Electronic Health --- Records, Electronic Medical --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Cybersecurity --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Investigative Technics --- Investigative Technic --- Investigative Technique --- Technic, Investigative --- Technics, Investigative --- Technique, Investigative --- Techniques, Investigative --- Epidemiologic Method --- Epidemiological Methods --- Methods, Epidemiologic --- Epidemiological Method --- Method, Epidemiologic --- Method, Epidemiological --- Methods, Epidemiological --- Epidemiology --- Community-Based Distribution --- Contraceptive Distribution --- Delivery of Healthcare --- Dental Care Delivery --- Distribution, Non-Clinical --- Distribution, Nonclinical --- Distributional Activities --- Healthcare --- Healthcare Delivery --- Healthcare Systems --- Non-Clinical Distribution --- Nonclinical Distribution --- Delivery of Dental Care --- Health Care Delivery --- Health Care Systems --- Activities, Distributional --- Activity, Distributional --- Care, Health --- Community Based Distribution --- Community-Based Distributions --- Contraceptive Distributions --- Deliveries, Healthcare --- Delivery, Dental Care --- Delivery, Health Care --- Delivery, Healthcare --- Distribution, Community-Based --- Distribution, Contraceptive --- Distribution, Non Clinical --- Distributional Activity --- Distributions, Community-Based --- Distributions, Contraceptive --- Distributions, Non-Clinical --- Distributions, Nonclinical --- Health Care System --- Healthcare Deliveries --- Healthcare System --- Non Clinical Distribution --- Non-Clinical Distributions --- Nonclinical Distributions --- System, Health Care --- System, Healthcare --- Systems, Health Care --- Systems, Healthcare --- Data Aggregation --- Data Collection Methods --- Dual Data Collection --- Aggregation, Data --- Collection Method, Data --- Collection Methods, Data --- Collection, Data --- Collection, Dual Data --- Data Collection Method --- Method, Data Collection --- Methods, Data Collection --- Forms as Topic --- Personal Identification Systems --- Travel Documents --- Document, Travel --- Documents, Travel --- Forms as Topics --- Identification System, Personal --- Identification Systems, Personal --- Personal Identification System --- Records as Topics --- System, Personal Identification --- Systems, Personal Identification --- Travel Document --- Administration, Health Services --- Health Services --- Administration and Organization --- Administrative Technics --- Administrative Techniques --- Coordination, Administrative --- Logistics --- Supervision --- Technics, Administrative --- Techniques, Administrative --- Administration --- Administrative Coordination --- Administrative Technic --- Administrative Technique --- Technic, Administrative --- Technique, Administrative --- Records, Medical --- Transcription, Medical --- Health Diaries --- Medical Transcription --- Diaries, Health --- Diary, Health --- Health Diary --- Medical Record --- Medical Transcriptions --- Record, Medical --- Transcriptions, Medical --- Information Sciences --- Science, Information --- Sciences, Information --- National Security --- Measure, Security --- Measures, Security --- Security Measure --- Security, National --- Automated Medical Record System --- Automated Medical Record Systems --- Automated Medical Records System --- Computerized Medical Record --- Computerized Medical Record System --- Computerized Medical Record Systems --- Computerized Medical Records --- Computerized Medical Records System --- Computerized Patient Medical Records --- Medical Record System, Automated --- Medical Record System, Computerized --- Medical Record Systems, Automated --- Medical Record Systems, Computerized --- Medical Record, Computerized --- Medical Records System, Automated --- Medical Records System, Computerized --- Medical Records Systems, Automated --- Medical Records, Computerized --- Automated Medical Records Systems --- Computerized Medical Records Systems --- Record, Computerized Medical --- Records, Computerized Medical --- methods --- organization & administration --- Computer science. --- Health administration. --- Computer security. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Health Administration. --- Information Systems Applications (incl. Internet). --- e-Commerce/e-business. --- Health services administration --- Data processing. --- Clinical informatics --- Health informatics --- Medical information science --- Information science --- Data processing --- Practice of medicine. --- Medical practice --- Practice of medicine --- Physician practice acquisitions --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Application software. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the Third International Conference on Biometrics, ICB 2009, held in Alghero, Italy, June 2-5, 2009. The 36 revised full papers and 93 revised poster papers presented were carefully reviewed and selected from 250 submissions. Biometric criteria covered by the papers are assigned to face, speech, fingerprint and palmprint, multibiometrics and security, gait, iris, and other biometrics. In addition there are 4 papers on challenges and competitions that currently are under way, thus presenting an overview on the evaluation of biometrics.
Biometry --- Computer Security --- Computer Communication Networks --- Pattern Recognition, Automated --- Security Measures --- Information Science --- Statistics as Topic --- Epidemiologic Measurements --- Computer Systems --- Epidemiologic Methods --- Public Health --- Organization and Administration --- Computing Methodologies --- Environment and Public Health --- Investigative Techniques --- Health Services Administration --- Health Care --- Analytical, Diagnostic and Therapeutic Techniques and Equipment --- Computer Science --- Electrical Engineering --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Community-Based Distribution --- Contraceptive Distribution --- Delivery of Healthcare --- Dental Care Delivery --- Distribution, Non-Clinical --- Distribution, Nonclinical --- Distributional Activities --- Healthcare --- Healthcare Delivery --- Healthcare Systems --- Non-Clinical Distribution --- Nonclinical Distribution --- Delivery of Dental Care --- Health Care Delivery --- Health Care Systems --- Activities, Distributional --- Activity, Distributional --- Care, Health --- Community Based Distribution --- Community-Based Distributions --- Contraceptive Distributions --- Deliveries, Healthcare --- Delivery, Dental Care --- Delivery, Health Care --- Delivery, Healthcare --- Distribution, Community-Based --- Distribution, Contraceptive --- Distribution, Non Clinical --- Distributional Activity --- Distributions, Community-Based --- Distributions, Contraceptive --- Distributions, Non-Clinical --- Distributions, Nonclinical --- Health Care System --- Healthcare Deliveries --- Healthcare System --- Non Clinical Distribution --- Non-Clinical Distributions --- Nonclinical Distributions --- System, Health Care --- System, Healthcare --- Systems, Health Care --- Systems, Healthcare --- Administration, Health Services --- Health Services --- Investigative Technics --- Investigative Technic --- Investigative Technique --- Technic, Investigative --- Technics, Investigative --- Technique, Investigative --- Techniques, Investigative --- High Performance Computing --- Methodologies, Computing --- Computing Methodology --- Computing, High Performance --- Methodology, Computing --- Performance Computing, High --- Administration and Organization --- Administrative Technics --- Administrative Techniques --- Coordination, Administrative --- Logistics --- Supervision --- Technics, Administrative --- Techniques, Administrative --- Administration --- Administrative Coordination --- Administrative Technic --- Administrative Technique --- Technic, Administrative --- Technique, Administrative --- Environment, Preventive Medicine & Public Health --- Environment, Preventive Medicine and Public Health --- Health, Public --- Epidemiologic Method --- Epidemiological Methods --- Methods, Epidemiologic --- Epidemiological Method --- Method, Epidemiologic --- Method, Epidemiological --- Methods, Epidemiological --- Epidemiology --- Organization, Computer Systems --- Computer Architecture --- Computer Systems Development --- Computer Systems Evaluation --- Computer Systems Organization --- Real-Time Systems --- Architecture, Computer --- Architectures, Computer --- Computer Architectures --- Computer System --- Computer Systems Evaluations --- Development, Computer Systems --- Evaluation, Computer Systems --- Evaluations, Computer Systems --- Real Time Systems --- Real-Time System --- System, Computer --- System, Real-Time --- Systems, Computer --- Systems, Real-Time --- Measurements, Epidemiologic --- Epidemiologic Measurement --- Measurement, Epidemiologic --- Area Analysis --- Correlation Studies --- Correlation Study --- Correlation of Data --- Data Analysis --- Estimation Technics --- Estimation Techniques --- Indirect Estimation Technics --- Indirect Estimation Techniques --- Multiple Classification Analysis --- Service Statistics --- Statistical Study --- Statistics, Service --- Tables and Charts as Topic --- Analyses, Area --- Analyses, Data --- Analyses, Multiple Classification --- Analysis, Area --- Analysis, Data --- Analysis, Multiple Classification --- Area Analyses --- Classification Analyses, Multiple --- Classification Analysis, Multiple --- Data Analyses --- Data Correlation --- Data Correlations --- Estimation Technic --- Estimation Technic, Indirect --- Estimation Technics, Indirect --- Estimation Technique --- Estimation Technique, Indirect --- Estimation Techniques, Indirect --- Indirect Estimation Technic --- Indirect Estimation Technique --- Multiple Classification Analyses --- Statistical Studies --- Studies, Correlation --- Studies, Statistical --- Study, Correlation --- Study, Statistical --- Technic, Estimation --- Technic, Indirect Estimation --- Technics, Estimation --- Technics, Indirect Estimation --- Technique, Estimation --- Technique, Indirect Estimation --- Techniques, Estimation --- Techniques, Indirect Estimation --- Information Sciences --- Science, Information --- Sciences, Information --- National Security --- Measure, Security --- Measures, Security --- Security Measure --- Security, National --- Automated Pattern Recognition --- Pattern Recognition System --- Pattern Recognition Systems --- Computer Network Management --- Databases, Distributed --- Distributed Systems --- Extranets --- Intranets --- Network Communication Protocols --- Telecommunication Networks --- Communication Network, Computer --- Communication Networks, Computer --- Communication Protocol, Network --- Communication Protocols, Network --- Computer Communication Network --- Database, Distributed --- Distributed Database --- Distributed Databases --- Distributed System --- Extranet --- Intranet --- Management, Computer Network --- Network Communication Protocol --- Network Management, Computer --- Network, Computer Communication --- Network, Telecommunication --- Networks, Computer Communication --- Networks, Telecommunication --- Protocol, Network Communication --- Protocols, Network Communication --- System, Distributed --- Systems, Distributed --- Telecommunication Network --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Cybersecurity --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- organization & administration --- methods --- Computer science. --- Image processing. --- Pattern recognition. --- Application software. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Pattern Recognition. --- Computer Applications. --- Computers and Society. --- Image Processing and Computer Vision. --- Management of Computing and Information Systems. --- Computer Appl. in Administrative Data Processing. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Informatics --- Science --- Communication systems --- Optical pattern recognition. --- Computer vision. --- Information Systems. --- Information systems. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Pattern perception --- Perceptrons --- Visual discrimination --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Optical equipment --- Biometric identification --- Identification --- Computer networks --- Automation --- Access control
Listing 1 - 8 of 8 |
Sort by
|