OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 23 from your keywords: subject="Computer security"
First Page Previous 1 2 3 Next Last Page
cover
Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools
Comment Share
JOANNA, KołodziejMATLEO, RepettoARMEND, Duzha

This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architecture…

Edition
-
ISBN/ISSN
9783031040368
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Counterterrorism and Cybersecurity Total Information Awareness
Comment Share
Newton Lee

From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Hom…

Edition
-
ISBN/ISSN
9783319172446
Collation
-
Series Title
-
Call Number
004.6
Availability0
Add to basket
MARC DownloadCite
cover
Critical infrastructure protection IX
Comment Share
IFIP Working Group 1110 International Conference on Critical Infrastructure Protection

The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and i…

Edition
-
ISBN/ISSN
9783319265674
Collation
xviii, 331 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cryptography and information security in the Balkans
Comment Share
BalkanCryptSecSiddika Berna Ors Yalcin

This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardwa…

Edition
-
ISBN/ISSN
9783319213569
Collation
x, 251 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber denial, deception and counter deception : a framework for supporting ac…
Comment Share
Kristin E. HeckmanFrank J. StechRoshan K. Thomas

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D & D) techniques and their orchestration in service of an organization's mission. Concepts for cyber…

Edition
-
ISBN/ISSN
9783319251332
Collation
xv, 251 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber operations : building, defending, and attacking modern computer networks
Comment Share
Mike O'Leary

Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will en…

Edition
-
ISBN/ISSN
9781484242940
Collation
xxxi, 1136 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber security and privacy
Comment Share
Cyber Security and Privacy EU ForumFrances Cleary

This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as security and privacy in the cloud; security and privacy technologies…

Edition
-
ISBN/ISSN
9783319253602
Collation
xvi, 151 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber-risk management
Comment Share
Atle RefsdalBjornar SolhaugKetil Stølen

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typi…

Edition
-
ISBN/ISSN
9783319235707
Collation
xi, 145 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cybersecurity in Israel
Comment Share
Lior TabanskyIsaac Ben-Israel

This SpringerBrief gives the reader a detailed account of how cybersecurity in Israel has evolved over the past two decades. The formation of the regions cybersecurity strategy is explored and an in-depth analysis of key developments in cybersecurity policy is provided. The authors examine cybersecurity from an integrative national perspective and see it as a set of policies and actions with tw…

Edition
-
ISBN/ISSN
9783319189864
Collation
-
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Data privacy management, autonomous spontaneous security, and security assurance
Comment Share
DPM (Workshop), Joaquin Garcia-Alfaro

This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 3rd International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Compute…

Edition
-
ISBN/ISSN
9783319170169
Collation
xviii, 343 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?