OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 211 from your keywords: subject="security"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Trust, Privacy and Security in Digital Business 12th International Conferenc…
Comment Share
LAMBRINOUDAKIS, CostasLOPEZ, JavierFISCHER-HUBNER, Simone

This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; t…

Edition
-
ISBN/ISSN
978-3-319-22906-5
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trust and Trustworthy Computing 8th International Conference, TRUST 2015, He…
Comment Share
CONTI, MauroSCHUNTER, MatthiasASKOXYLAKIS, Ioannis

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust an…

Edition
-
ISBN/ISSN
978-3-319-22846-4
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015,…
Comment Share
JENSEN, Christian DamsgaardDIMITRAKOS, TheoMURAYAMA, YukoMARSH, Stephen

This book constitutes the refereed proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2015, held in Hamburg, Germany, in May 2015. The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 28 submissions. In addition, the book contains one invited paper and 5 papers from a special session on trusted cloud ecosystems.…

Edition
-
ISBN/ISSN
978-3-319-18491-3
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
The Global Cyber-Vulnerability Report
Comment Share
V.S. Subrahmanian,

This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters…

Edition
1
ISBN/ISSN
978-3-319-25760-0
Collation
XII, 296, 1 b/w illustrations, 398 illustrations in colour
Series Title
Terrorism, Security, and Computation
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Counterterrorism and Cybersecurity Total Information Awareness
Comment Share
Newton Lee

From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Hom…

Edition
-
ISBN/ISSN
9783319172446
Collation
-
Series Title
-
Call Number
004.6
Availability0
Add to basket
MARC DownloadCite
cover
The Future of Identity in the Information Society
Comment Share
Vashek Matyáš

What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Su…

Edition
1
ISBN/ISSN
978-3-642-03315-5
Collation
X, 283
Series Title
IFIP Advances in Information and Communication Technology
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
The European Public Prosecutor's Office
Comment Share
Lorena Bachmaier Winter

This book explores the European Public Prosecutor’s Office (EPPO), the creation of which was approved in the Regulation adopted by the Justice and Home Affairs (JHA) Council on 12 October 2017. The EPPO will be an independent European prosecution office tasked with investigating and prosecuting those crimes defined in the recently adopted Regulation 2017/1371 on combating fraud against th…

Edition
1
ISBN/ISSN
978-3-319-93916-2
Collation
XVIII, 279
Series Title
Legal Studies in International, European and Comparative Criminal Law
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Information Systems Security and Privacy: First International Conference, ICI…
Comment Share
CAMP, OlivierWEIPPL, EdgarBIDAN, ChristopheAÏMEUR, Esma

This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers, France, in February 2015. The 12 papers presented in this volume were carefully reviewed and selection from a total of 56 submissions. They were organized in topical sections named: data and software security; privacy and confidential…

Edition
-
ISBN/ISSN
978-3-319-27667-0
Collation
XII, 251
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Information Systems Security: 11th International Conference, ICISS 2015, Kolk…
Comment Share
JAJODA,SushilMAZUMDAR, Chandan

This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigati…

Edition
-
ISBN/ISSN
978-3-319-26960-3
Collation
XVI, 584
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Russia's Turn to the East Domestic Policymaking and Regional Cooperation
Comment Share
HELGE, BlakkisrudELANA, Wilson Rowe

Development studies; Russia; Far East; International affairs; Energy; Shanghai cooperation organization; Economic development; Security policy; Multilateral organizations; Diplomacy; Regionalism; Russian–European relations; Russia’s “pivot to the East”; Annexation of Crimea; Regional politics; Eurasia; Ukraine; Sanctions regime; Foreign policy

Edition
-
ISBN/ISSN
9783319697901
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?