OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 211 from your keywords: subject="security"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Nuclear Terrorism and National Preparedness
Comment Share
AOIKYAN, SamuelDIAMOND, David

The nuclear crisis in Fukushima and growing threats of nuclear terrorism must serve as a wake-up call, prompting greater action to prepare ourselves for nuclear and radiological disasters. Our strategy to prepare for these threats is multi-layered and the events of these past years have proved the necessity to re-evaluate the national and international preparedness goals on a scale never before…

Edition
1
ISBN/ISSN
978-94-017-9890-7
Collation
IX, 263
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Non-functional Requirements in Systems Analysis and Design
Comment Share
ADAMS Kevin MacG.

This book will help readers gain a solid understanding of non-functional requirements inherent in systems design endeavors. It contains essential information for those who design, use and maintain complex engineered systems, including experienced designers, teachers of design, system stakeholders and practicing engineers. Coverage approaches non-functional requirements in a novel way by pres…

Edition
1
ISBN/ISSN
1566-0443
Collation
XXIV, 264
Series Title
Topics in Safety, Risk, Reliability and Quality
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Confe…
Comment Share
SCHNEIDER, WolfgangREIMER, HelmutPOHLMANN, Norbert

This book presents the most interesting talks given at ISSE 2015 – the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include: · Encrypted Communication · Trust Services, eID and Cloud Security · Industrial Security and Internet of Things · Cybersecurity, Cybercrime…

Edition
-
ISBN/ISSN
978-3-658-10933-2
Collation
XIII, 315
Series Title
-
Call Number
004
Availability0
Add to basket
MARC DownloadCite
cover
Detecting Peripheral-based Attacks on the Host Memory
Comment Share
Patrick Stewin

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host?s main memory, storing cryptographic keys, passwo…

Edition
-
ISBN/ISSN
9783319135151
Collation
xv, 108 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Detection of intrusions and malware, and vulnerability assessment : 6th inter…
Comment Share
DIMVA 2009

This book constitutes the refereed proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2009, held in Milan, Italy, in July 2009. The 10 revised full papers presented together with three extended abstracts were carefully selected from 44 initial submissions. The papers are organized in topical sections on malware and SPAM, e…

Edition
-
ISBN/ISSN
9783642029189
Collation
x, 223 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Railway Infrastructure Security
Comment Share
SETOLA, RobertoSFORZA, AntonioVITTORINI, ValeriaPRAGLIOLA, Concetta

This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it …

Edition
-
ISBN/ISSN
978-3-319-04426-2
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Game Theoretic Analysis of Congestion, Safety and Security Traffic and Trans…
Comment Share
HAUSKEN, KjellZHUANG, Jun

Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic…

Edition
-
ISBN/ISSN
978-3-319-11674-7
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Why Cryptography Should Not Rely on Physical Attack Complexity
Comment Share
KRAMER, Juliane

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…

Edition
-
ISBN/ISSN
978-981-287-787-1
Collation
XXI, 122
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Digital Defense A Cybersecurity Primer
Comment Share
Joseph N. Pelton

Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard against individual security breaches. This guide clearly explains the technology at issue, the points of weakness, and the best ways to proactively monitor and maintain the integrity of individual networks. Covering both the most common personal attacks of identity fraud, ph…

Edition
-
ISBN/ISSN
9783319199535
Collation
xx, 209 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Digital forensics and cyber crime : 7th International Conference, ICDF2C 2015…
Comment Share
International Conference on Digital Forensics and Cyber Crime

This book constitutes the refereed proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2015, held in Seoul, South Korea, in October 2015. The 14 papers and 3 abstracts were selected from 40 submissions and cover diverse topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and international cooperatio…

Edition
-
ISBN/ISSN
9783319255125
Collation
x, 217 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?