OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 214 from your keywords: subject="security"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Cyber warfare : building the scientific foundation
Comment Share
Paulo ShakarianSushil Jajodia

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rig…

Edition
-
ISBN/ISSN
9783319140391
Collation
xiii, 321 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber-risk management
Comment Share
Atle RefsdalBjornar SolhaugKetil Stølen

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typi…

Edition
-
ISBN/ISSN
9783319235707
Collation
xi, 145 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cybersecurity in Israel
Comment Share
Lior TabanskyIsaac Ben-Israel

This SpringerBrief gives the reader a detailed account of how cybersecurity in Israel has evolved over the past two decades. The formation of the regions cybersecurity strategy is explored and an in-depth analysis of key developments in cybersecurity policy is provided. The authors examine cybersecurity from an integrative national perspective and see it as a set of policies and actions with tw…

Edition
-
ISBN/ISSN
9783319189864
Collation
-
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Foundations and Practice of Security
Comment Share
Frédéric CuppensJoaquin Garcia-AlfaroNur Zincir HeywoodPhilip W. L. Fong

This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on privacy; software se…

Edition
-
ISBN/ISSN
978-3-319-17040-4
Collation
XIII, 375 pages
Series Title
Lecture Notes in Computer Science
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Topics in Cryptology –- CT-RSA 2015 The Cryptographer's Track at the RSA C…
Comment Share
NYBERG, Kaisa

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based enc…

Edition
-
ISBN/ISSN
978-3-319-16715-2
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Data privacy management, autonomous spontaneous security, and security assurance
Comment Share
DPM (Workshop), Joaquin Garcia-Alfaro

This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 3rd International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Compute…

Edition
-
ISBN/ISSN
9783319170169
Collation
xviii, 343 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Applied Cryptography and Network Security: 13th International Conference, ACN…
Comment Share
MALKIN, Tal

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secur…

Edition
Ed. 1
ISBN/ISSN
978-3-319-28166-7
Collation
XVIII, 698
Series Title
Lecture Notes in Computer Science
Call Number
005.7 APP a
Availability0
Add to basket
MARC DownloadCite
cover
Data and applications security and privacy XXIX
Comment Share
Annual IFIP WG 113 Working Conference on Data and Applications SecurityPierangela Samarati

This book constitutes the refereed proceedings of the 29th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2015, held in Fairfax, VA, USA, in July 2015. The 18 revised full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: data anonymi…

Edition
-
ISBN/ISSN
9783319208107
Collation
xi, 364 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Theory of Cryptography 12th International Conference, TCC 2015, Warsaw, Pola…
Comment Share
DODIS, YevgeniyNIELSEN, Jesper Buus

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concu…

Edition
-
ISBN/ISSN
978-3-662-46497-7
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Theory of Cryptography 12th International Conference, TCC 2015, Warsaw, Pola…
Comment Share
DODIS, YevgeniyNIELSEN, Jesper Buus

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concu…

Edition
-
ISBN/ISSN
978-3-662-46494-6
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?