OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 211 from your keywords: subject="security"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Digital-forensics and watermarking : 13th International Workshop, IWDW 2014, …
Comment Share
Yun Q. Shi

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on forensics; watermarkin…

Edition
-
ISBN/ISSN
9783319193212
Collation
-
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Air Transport System
Comment Share
SCHMITT, DieterGOLLNICK, Volker

The book addresses all major aspects to be considered for the design and operation of aircrafts within the entire transportation chain. It provides the basic information about the legal environment, which defines the basic requirements for aircraft design and aircraft operation. The interactions between airport, air traffic management and the airlines are described. The market forecast meth…

Edition
Ed. 1
ISBN/ISSN
978-3-7091-1880-1
Collation
XII, 377
Series Title
-
Call Number
629.47 SCH a
Availability0
Add to basket
MARC DownloadCite
cover
Microbial Toxins and Related Contamination in the Food Industry
Comment Share
CARUSO, GabriellaCARUSA, GiorgiaLAGANA, Pasqualina LaganàDELIA, Antonino SantiPARISI, SalvatoreBARONE, CaterinaMELCARNE, LuciaMAZZU, Francesco

This Brief concerns the chemical risk in food products from the viewpoint of microbiology. The “Hazard Analysis and Critical Control Point” (HACCP) approach, which is applied for this purpose, is dedicated to the study and the analysis of all possible dangers by food consumptions and the related countermeasures with the aim of protecting the health of consumers. This difficult objective is …

Edition
1
ISBN/ISSN
978-3-319-20558-8
Collation
VI, 101
Series Title
SpringerBriefs in Molecular Science
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Tu…
Comment Share
LEANDER, Gregor

This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementatio…

Edition
-
ISBN/ISSN
978-3-662-48116-5
Collation
XI, 600
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, …
Comment Share
CID, CarlosRECHBERGER, Christian

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theor…

Edition
-
ISBN/ISSN
978-3-662-46706-0
Collation
XI, 636
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Watermarking Security
Comment Share
BAS, PatrickFURON, TeddyCAYRE, FrançoisDOERR, GwenaëlMATHON, Benjamin

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their waterm…

Edition
-
ISBN/ISSN
978-981-10-0506-0
Collation
IX, 125
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
VoIP and PBX Security and Forensics A Practical Approach
Comment Share
ANDROULIDAKIS, osif I.

This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…

Edition
-
ISBN/ISSN
978-3-319-29721-7
Collation
XI, 103
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Visual Cryptography for Image Processing and Security Theory, Methods, and A…
Comment Share
LIU, FengYAN, Wei Qi

This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with ne…

Edition
-
ISBN/ISSN
978-3-319-23473-1
Collation
XVI, 167
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Violence in Nigeria Patterns and Trends
Comment Share
TAFT, PatriciaHAKEN, Nate

This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative spatial-temporal distribution of conflict factors in Nigeria. The analysis of violence at state and local levels reveals a fractal pattern of…

Edition
-
ISBN/ISSN
978-3-319-14935-6
Collation
XIV, 136
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Locating, Classifying and Countering Agile Land Vehicles; With Applications t…
Comment Share
David D. SworderJohn E. Boyd

This book examines real-time target tracking and identification algorithms with a focus on tracking an agile target. The authors look at several problems in which the tradeoff of accuracy and confidence must be made. These issues are explored within the context of specific tracking scenarios chosen to illustrate the tradeoffs in a simple and direct manner. The text covers the Gaussian wavelet e…

Edition
-
ISBN/ISSN
978-3-319-19431-8
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?