OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 216 from your keywords: subject="security"
First Page Previous 16 17 18 19 20 Next Last Page
cover
Security and Privacy in Wireless and Mobile Networks
Comment Share
KAMBOURAKIS, GeorgiosMARMOL, Felix GomezWANG, Guojun

Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless ecosystem is an ideal playground for many perpetrators: (a) handheld devices are used for critical tasks, such as e-commerce, bank transactions, payme…

Edition
Edisi 1
ISBN/ISSN
978-3-03842-780-3
Collation
-
Series Title
-
Call Number
003 SEC
Availability0
Add to basket
MARC DownloadCite
cover
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Se…
Comment Share
JAHANKHANI, Hamid

This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in London, UK, in September 2015. The 31 revised full papers presented were carefully reviewed and selected from 57 submissions. The papers focus on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with the 2…

Edition
-
ISBN/ISSN
978-3-319-23275-1
Collation
XIII, 361
Series Title
-
Call Number
004 GLO
Availability0
Add to basket
MARC DownloadCite
cover
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile App…
Comment Share
LU, ZhouWANG, WenyeWANG, Cliff

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance…

Edition
1
ISBN/ISSN
978-3-319-23287-4
Collation
XIII
Series Title
SpringerBriefs in Computer Science
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Multiphysics Modelling and Simulation for Systems Design and Monitoring:Proce…
Comment Share
HADAR, MohamedABBES, Mohamed SlimCHOLEY, Jean-YvesBOUKHAROUBA, TaoufikELNADY, TamerKANAEV, AndreiAMAR, Mounir Ben AmarCHAARI, Fakher

This book reports on the state of the art in the field of multiphysics systems. It consists of accurately reviewed contributions to the MMSSD’2014 conference, which was held from December 17 to 19, 2004 in Hammamet, Tunisia. The different chapters, covering new theories, methods and a number of case studies, provide readers with an up-to-date picture of multiphysics modeling and simulation. T…

Edition
1
ISBN/ISSN
978-3-319-38425-2
Collation
XII
Series Title
Applied Condition Monitoring
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Evolution of Cyber Technologies and Operations to 2035
Comment Share
BLOWERS, Misty

This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serv…

Edition
-
ISBN/ISSN
978-3-319-23585-1
Collation
4 b/w illustrations, 7 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Evaluation of Fire Flow Methodologies
Comment Share
BENFER, Matthew E.SCHEFFEY, Joseph L.

This SpringerBrief offers careful assessments of the appropriateness and effectiveness of currently available methodologies for fire flow. It explains the water supply requirements for firefighting including rate of flow, the residual pressure required at that flow, and the duration that is necessary to control a major fire in a specific structure. First reviewing existing fire flow calculation…

Edition
-
ISBN/ISSN
978-1-4939-2889-7
Collation
7 b/w illustrations, 8 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
ATEX—Explosive Atmospheres: Risk Assessment, Control and Compliance
Comment Share
JESPEN, Torben

This book details how safety (i.e. the absence of unacceptable risks) is ensured in areas where potentially explosive atmospheres (ATEX) can arise. The book also offers readers essential information on how to comply with the newest (April 2016) EU legislation when the presence of ATEX cannot be avoided. By presenting general guidance on issues arising out of the EU ATEX legislation – espec…

Edition
Ed. 1
ISBN/ISSN
978-3-319-31367-2
Collation
XII, 197
Series Title
Springer Series in Reliability Engineering
Call Number
600 JES a
Availability0
Add to basket
MARC DownloadCite
cover
Environmental Security of the European Cross-Border Energy Supply Infrastructure
Comment Share
OSIPOV, M.G. Culshaw, V.I.VICTOROV, S.J. Booth, A.S.

The current volume provides examples of how environmental hazards such as landslides, earthquakes, mountain processes, cold climate processes and tidal flows and currents can affect the energy supply infrastructure. In times of uncertainty, the security of the European cross-border energy supply infrastructure, such as pipelines, has great importance. Whilst the potential effects of political d…

Edition
-
ISBN/ISSN
978-94-017-9538-8
Collation
24 b/w illustrations, 74 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Ag…
Comment Share
ARTHUR, WillCHALLENER, DavidGOLDMAN, Kenneth

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…

Edition
Ed. 1
ISBN/ISSN
978-1-4302-6584-9
Collation
-
Series Title
-
Call Number
001.54 ART p
Availability0
Add to basket
MARC DownloadCite
cover
Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Agai…
Comment Share
DONALDSON, Scott E.SIEGEL, Stanley G.WILLIAMS, Chris K.ASLAM, Abdul

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity pro…

Edition
-
ISBN/ISSN
978-1-4302-6083-7
Collation
223 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?