Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Rechnernetz --- Zeitschrift --- Online-Ressource --- Deutsches Forschungsnetz
Choose an application
Rechnernetz --- Zeitschrift --- Online-Ressource --- Deutsches Forschungsnetz
Choose an application
Authentifikation --- Authentifikation. --- Chiffrierung --- Chiffrierung. --- Computer security --- Computersicherheit. --- Cryptography --- Datensicherung. --- Digital Rights Management --- Digital Rights Management. --- Kryptoanalyse --- Kryptoanalyse. --- Kryptologie. --- Privatsphäre. --- Rechnernetz --- Rechnernetz. --- Kryptologie --- Privatsphäre --- Datensicherung --- Computersicherheit
Choose an application
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437 Written by leaders in the field Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices Presents methods for analysis, along with problem-solving techniques for implementing practical solutions
Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer security. --- Data protection. --- Rechnernetz --- Computersicherheit --- Datensicherung --- Informationssystem --- Datenschutz
Choose an application
Germanistik --- Internet --- Zeitschrift --- Online-Ressource --- Literaturwissenschaft --- Computerunterstütztes Verfahren --- Netzpublikation --- Online-Publikation --- Computerdatei im Fernzugriff --- Online-Dokument --- On-line-Dokument --- On-line-Publikation --- Elektronische Publikation --- Periodikum --- Zeitschriften --- Presse --- Fortlaufendes Sammelwerk --- Computergestütztes Verfahren --- Computerunterstützte Methode --- Rechnerunterstütztes Verfahren --- Rechnergestütztes Verfahren --- Computer aided method --- Computer assisted method --- Computer based method --- Computerbasiertes Verfahren --- Rechnerunterstützte Methode --- Rechnerunterstützung --- Computerunterstützung --- Computer aid --- Computer assistance --- Datenverarbeitung --- Literaturwissenschaften --- Philologie --- Datenautobahn --- ARPANet --- Webwissenschaft --- Rechnernetz --- TCP/IP --- Deutsche Philologie --- Deutsch --- Computergestütztes Verfahren --- Computerunterstützte Methode --- Rechnerunterstütztes Verfahren --- Rechnergestütztes Verfahren --- Rechnerunterstützte Methode --- Rechnerunterstützung --- Computerunterstützung --- Computerunterstütztes Verfahren.
Choose an application
Dem raketenhaften Aufstieg der Piratenpartei folgte ihr ebenso schneller Niedergang. Ist das mit ihr verbundene Experiment politischer Willensbildung - Liquid Democracy - also ebenso gescheitert? Auf dem originellen Weg der Grounded Theory nähert sich Anja Adler der jüngsten deutschen Politikgeschichte, um sich mit dem ambitionierten Vorschlag zur Entwicklung eines neuen Betriebssystems für die Politik auseinanderzusetzen. Durch zahlreiche Interviews mit den Akteurinnen internet-gestützter Beratungs- und Entscheidungsverfahren zeichnet sie ein lebendiges und durchaus zukunftstaugliches Portrait sowohl der konkreten Verfahren als auch der Einstellungen und Visionen von Demokratieentwicklerinnen.
Decision-making. --- Democracy. --- Demokratie. --- Entscheidungsfindung. --- Grounded Theory. --- Liquid Democracy. --- Political Science. --- Political System. --- Political Theory. --- Politics. --- Politik. --- Politikwissenschaft. --- Politische Theorie. --- Politisches System. --- Software. --- Politische Willensbildung --- Demokratie --- Internet --- Grounded theory --- POLITICAL SCIENCE / Political ideologies / Democracy. --- Qualitative Sozialforschung --- Datenautobahn --- ARPANet --- Webwissenschaft --- Rechnernetz --- TCP/IP --- Volksherrschaft --- Demokratischer Staat --- Democracy --- Herrschaftssystem --- Parteienstaat --- Republik --- Volkssouveränität --- Demokratische Bewegung --- Demokrat --- Postdemokratie --- Politik --- Politische Entscheidung --- Willensbildung --- Piratenpartei; Liquid Democracy; Grounded Theory; Software; Entscheidungsfindung; Politik; Demokratie; Politische Theorie; Politics; Politisches System; Politikwissenschaft; Pirate Party; Decision-making; Democracy; Political Theory; Political System; Political Science --- Piratenpartei Deutschland --- Influence --- PIRATEN (Political party : Germany) --- Pirate Party (Germany) --- Pirates (Political party : Germany)
Choose an application
This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.
Computer science. --- Computer Communication Networks. --- Computer system performance. --- Computer software. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- System Performance and Evaluation. --- Computer Science, general. --- Wireless communication systems --- Mobile computing --- Engineering & Applied Sciences --- Computer Science --- Management --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Software, Computer --- Informatics --- Computer communication systems. --- Computer system failures. --- Algorithms. --- Datensicherung. --- Datenverwaltung. --- Drahtloses Sensorsystem. --- Funknetz. --- Netzwerktopologie. --- Netzwerkverwaltung. --- Topologie --- Netzform --- Netzstruktur --- Netztopologie --- Netzarchitektur --- Rechnernetz --- Radio network --- Wireless network --- Drahtloses Telekommunikationsnetz --- Telekommunikationsnetz --- Wireless sensor network --- Drahtloses Sensornetz --- Sensorsystem --- Datenmanagement --- Dateiverwaltung --- Datensicherheit --- Sicherheit --- Computersicherheit --- Softwareschutz --- Netzwerkmanagement --- Network management --- Netzmanagement --- Telecommunication systems --- Netzwerk --- Datenverarbeitung --- Science --- Computer systems --- Application software. --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Failures --- Distributed processing --- Foundations --- Computer networks. --- Electronic digital computers—Evaluation. --- Computer and Information Systems Applications.
Choose an application
This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.
Computer security --- Information networks --- Computer networks --- Computers --- Data encryption (Computer science) --- Data protection --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer Science --- Access control --- Security measures --- Information Technology --- Computer Science (Hardware & Networks) --- Automated information networks --- Networks, Information --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Data Encryption. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Distributed processing --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Datensicherung. --- Informationssystem. --- Kryptoanalyse. --- Privatsphäre. --- Rechnernetz. --- Zugriffskontrolle. --- Information services --- Information storage and retrieval systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Listing 1 - 8 of 8 |
Sort by
|