OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 214 from your keywords: subject="security"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Information Security: 18th International Conference, ISC 2015, Trondheim, Nor…
Comment Share
LOPEZ,JavierMITCHELL, Chris J.

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical section…

Edition
-
ISBN/ISSN
978-3-319-23317-8
Collation
XIII, 570
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Cryptography and information security in the Balkans
Comment Share
BalkanCryptSecSiddika Berna Ors Yalcin

This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardwa…

Edition
-
ISBN/ISSN
9783319213569
Collation
x, 251 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Mapping European security after Kosovo
Comment Share
SERGEI, MedvedevPETER, van Ham

This book provides new and stimulating perspectives on how Kosovo has shaped the new Europe. It breaks down traditional assumptions in the field of security studies by sidelining the theoretical worldview that underlies mainstream strategic thinking on recent events in Kosovo. The contributors challenge the epistemological definition of the Kosovo conflict, arguing that we should not only be co…

Edition
-
ISBN/ISSN
9780719062407
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
International Symposium on Mathematics, Quantum Theory, and Cryptography Pro…
Comment Share
TSUYOSHI, TakagiMASATO, WakayamaKEISUKE, TanakaNOBORU, Kunihiro

This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction mod…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Transactions on Data Hiding and Multimedia Security X
Comment Share
SHI, Yun Q.

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …

Edition
-
ISBN/ISSN
978-3-662-46739-8
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Causal Mechanisms in the Global Development of Social Policies
Comment Share
KUHIMANNJOHANNANULLMEIERFRANK

This open access edited volume introduces the concept of causal mechanisms to explore new ways of explaining the global dynamics of social policy, and shows that a mechanism-based approach provides several advantages over established approaches for studying social policy. The introductory chapter outlines the mechanism-based approach, which stands out by modularisation and a clear focus on acto…

Edition
-
ISBN/ISSN
9783030910884
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Cyber denial, deception and counter deception : a framework for supporting ac…
Comment Share
Kristin E. HeckmanFrank J. StechRoshan K. Thomas

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D & D) techniques and their orchestration in service of an organization's mission. Concepts for cyber…

Edition
-
ISBN/ISSN
9783319251332
Collation
xv, 251 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber operations : building, defending, and attacking modern computer networks
Comment Share
Mike O'Leary

Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will en…

Edition
-
ISBN/ISSN
9781484242940
Collation
xxxi, 1136 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber security and privacy
Comment Share
Cyber Security and Privacy EU ForumFrances Cleary

This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as security and privacy in the cloud; security and privacy technologies…

Edition
-
ISBN/ISSN
9783319253602
Collation
xvi, 151 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber security : analytics, technology and automation
Comment Share
Martti LehtoP. Neittaanmäki

Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomen…

Edition
-
ISBN/ISSN
9783319183022
Collation
-
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?