OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 25 from your keywords: subject="Computer security"
First Page Previous 1 2 3 Next Last Page
cover
Challenges in Cybersecurity and Privacy - the European Research Landscape
Comment Share
Bernabe, Jorge BernalSkarmeta, Antonio

Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness…

Edition
Ed. 1
ISBN/ISSN
9781000795509, 9788770220880
Collation
250
Series Title
-
Call Number
005.8 CHA c
Availability0
Add to basket
MARC DownloadCite
cover
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Det…
Comment Share
Sargsyan, GoharKavallieros, DimitriosKolokotronis, Nicholas

The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gain…

Edition
Ed. 1
ISBN/ISSN
9781680838343, 9781680838350
Collation
234
Series Title
NowOpen
Call Number
005.8 SEC s
Availability0
Add to basket
MARC DownloadCite
cover
Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools
Comment Share
JOANNA, KołodziejMATLEO, RepettoARMEND, Duzha

This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architecture…

Edition
-
ISBN/ISSN
9783031040368
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Counterterrorism and Cybersecurity Total Information Awareness
Comment Share
Newton Lee

From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Hom…

Edition
-
ISBN/ISSN
9783319172446
Collation
-
Series Title
-
Call Number
004.6
Availability0
Add to basket
MARC DownloadCite
cover
Critical infrastructure protection IX
Comment Share
IFIP Working Group 1110 International Conference on Critical Infrastructure Protection

The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and i…

Edition
-
ISBN/ISSN
9783319265674
Collation
xviii, 331 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cryptography and information security in the Balkans
Comment Share
BalkanCryptSecSiddika Berna Ors Yalcin

This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardwa…

Edition
-
ISBN/ISSN
9783319213569
Collation
x, 251 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber denial, deception and counter deception : a framework for supporting ac…
Comment Share
Kristin E. HeckmanFrank J. StechRoshan K. Thomas

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D & D) techniques and their orchestration in service of an organization's mission. Concepts for cyber…

Edition
-
ISBN/ISSN
9783319251332
Collation
xv, 251 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber operations : building, defending, and attacking modern computer networks
Comment Share
Mike O'Leary

Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will en…

Edition
-
ISBN/ISSN
9781484242940
Collation
xxxi, 1136 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber security and privacy
Comment Share
Cyber Security and Privacy EU ForumFrances Cleary

This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as security and privacy in the cloud; security and privacy technologies…

Edition
-
ISBN/ISSN
9783319253602
Collation
xvi, 151 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber-risk management
Comment Share
Atle RefsdalBjornar SolhaugKetil Stølen

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typi…

Edition
-
ISBN/ISSN
9783319235707
Collation
xi, 145 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?