OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 214 from your keywords: subject="security"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Why Cryptography Should Not Rely on Physical Attack Complexity
Comment Share
KRAMER, Juliane

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…

Edition
-
ISBN/ISSN
978-981-287-787-1
Collation
XXI, 122
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Digital Defense A Cybersecurity Primer
Comment Share
Joseph N. Pelton

Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard against individual security breaches. This guide clearly explains the technology at issue, the points of weakness, and the best ways to proactively monitor and maintain the integrity of individual networks. Covering both the most common personal attacks of identity fraud, ph…

Edition
-
ISBN/ISSN
9783319199535
Collation
xx, 209 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Digital forensics and cyber crime : 7th International Conference, ICDF2C 2015…
Comment Share
International Conference on Digital Forensics and Cyber Crime

This book constitutes the refereed proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2015, held in Seoul, South Korea, in October 2015. The 14 papers and 3 abstracts were selected from 40 submissions and cover diverse topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and international cooperatio…

Edition
-
ISBN/ISSN
9783319255125
Collation
x, 217 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Digital-forensics and watermarking : 13th International Workshop, IWDW 2014, …
Comment Share
Yun Q. Shi

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on forensics; watermarkin…

Edition
-
ISBN/ISSN
9783319193212
Collation
-
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Air Transport System
Comment Share
SCHMITT, DieterGOLLNICK, Volker

The book addresses all major aspects to be considered for the design and operation of aircrafts within the entire transportation chain. It provides the basic information about the legal environment, which defines the basic requirements for aircraft design and aircraft operation. The interactions between airport, air traffic management and the airlines are described. The market forecast meth…

Edition
Ed. 1
ISBN/ISSN
978-3-7091-1880-1
Collation
XII, 377
Series Title
-
Call Number
629.47 SCH a
Availability0
Add to basket
MARC DownloadCite
cover
Microbial Toxins and Related Contamination in the Food Industry
Comment Share
CARUSO, GabriellaCARUSA, GiorgiaLAGANA, Pasqualina LaganàDELIA, Antonino SantiPARISI, SalvatoreBARONE, CaterinaMELCARNE, LuciaMAZZU, Francesco

This Brief concerns the chemical risk in food products from the viewpoint of microbiology. The “Hazard Analysis and Critical Control Point” (HACCP) approach, which is applied for this purpose, is dedicated to the study and the analysis of all possible dangers by food consumptions and the related countermeasures with the aim of protecting the health of consumers. This difficult objective is …

Edition
1
ISBN/ISSN
978-3-319-20558-8
Collation
VI, 101
Series Title
SpringerBriefs in Molecular Science
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Tu…
Comment Share
LEANDER, Gregor

This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementatio…

Edition
-
ISBN/ISSN
978-3-662-48116-5
Collation
XI, 600
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, …
Comment Share
CID, CarlosRECHBERGER, Christian

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theor…

Edition
-
ISBN/ISSN
978-3-662-46706-0
Collation
XI, 636
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Watermarking Security
Comment Share
BAS, PatrickFURON, TeddyCAYRE, FrançoisDOERR, GwenaëlMATHON, Benjamin

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their waterm…

Edition
-
ISBN/ISSN
978-981-10-0506-0
Collation
IX, 125
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
VoIP and PBX Security and Forensics A Practical Approach
Comment Share
ANDROULIDAKIS, osif I.

This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…

Edition
-
ISBN/ISSN
978-3-319-29721-7
Collation
XI, 103
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?