OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 495 from your keywords: subject="DATA"
First Page Previous 21 22 23 24 25 Next Last Page
cover
Safe to be open - study on the protection of research data and recommendation…
Comment Share
LUCIE, GuibaultANDREAS, Wiebe

This study addresses the most important legal issues when implementing an open access e-infrastructure for research data. It examines the legal requirements for different kinds of usage of research data in an open access infrastructure, such as OpenAIREplus, which links them to publications. The existing legal framework regarding potentially relevant intellectual property (IP) rights is analyse…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Environmental Software Systems. Infrastructures, Services and Applications 1…
Comment Share
DENZER, RalfARGENT, Robert M.SCHIMAK, GeraldHREBICEK, Jiří

This book constitutes the refereed proceedings of the 11th IFIP WG 5.11 International Symposium on Environmental Software Systems, ISESS 2015, held in Melbourne, Australia, in March 2015. The 62 revised full papers presented were carefully reviewed and selected from 104 submissions. The papers are organized in the following topical sections: information systems, information modeling and semanti…

Edition
-
ISBN/ISSN
978-3-319-15994-2
Collation
206 illustrations in colour
Series Title
Springer Texts in Business and Economics
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trustworthy Computing and Services International Conference, ISCTCS 2014, Be…
Comment Share
YUEMING, LuWU, XUZANG, XI

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building;…

Edition
-
ISBN/ISSN
978-3-662-47401-3
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, …
Comment Share
YUNG, MotiZHU, LiehuangYANG, Yanjiang

Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…

Edition
-
ISBN/ISSN
978-3-319-27998-5
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trusted Computing for Embedded Systems
Comment Share
CANDAELE, BernardANAGNOSTOPOULOS, IraklisSOUDRIS, Dimitrios

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. …

Edition
-
ISBN/ISSN
978-3-319-09420-5
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trust, Privacy and Security in Digital Business 12th International Conferenc…
Comment Share
LAMBRINOUDAKIS, CostasLOPEZ, JavierFISCHER-HUBNER, Simone

This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; t…

Edition
-
ISBN/ISSN
978-3-319-22906-5
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trust and Trustworthy Computing 8th International Conference, TRUST 2015, He…
Comment Share
CONTI, MauroSCHUNTER, MatthiasASKOXYLAKIS, Ioannis

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust an…

Edition
-
ISBN/ISSN
978-3-319-22846-4
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015,…
Comment Share
JENSEN, Christian DamsgaardDIMITRAKOS, TheoMURAYAMA, YukoMARSH, Stephen

This book constitutes the refereed proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2015, held in Hamburg, Germany, in May 2015. The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 28 submissions. In addition, the book contains one invited paper and 5 papers from a special session on trusted cloud ecosystems.…

Edition
-
ISBN/ISSN
978-3-319-18491-3
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
The Global Cyber-Vulnerability Report
Comment Share
V.S. Subrahmanian,

This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters…

Edition
1
ISBN/ISSN
978-3-319-25760-0
Collation
XII, 296, 1 b/w illustrations, 398 illustrations in colour
Series Title
Terrorism, Security, and Computation
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trends and Applications in Knowledge Discovery and Data Mining PAKDD 2015 Wo…
Comment Share
CAO, TruLIM, Ee-PengZHOU, Zhi-HuaXIAO-LI, LI

This book constitutes the refereed proceedings at PAKDD Workshops 2015, held in conjunction with PAKDD, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining in Ho Chi Minh City, Vietnam, in May 2015. The 23 revised papers presented were carefully reviewed and selected from 57 submissions. The workshops affiliated with PAKDD 2015 include: Pattern Mining and Application of Big …

Edition
-
ISBN/ISSN
978-3-319-25660-3
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?