OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 1712 from your keywords: subject="Computer"
First Page Previous 76 77 78 79 80 Next Last Page
cover
Transactions on Computational Science XXV
Comment Share
GAVRILOVA, Marina L.TAN, C.J. KennethSAEED, KhalidCHAKI, Nabendu

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, enco…

Edition
-
ISBN/ISSN
978-3-662-47074-9
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Traffic Monitoring and Analysis 7th International Workshop, TMA 2015, Barcel…
Comment Share
Bonaventure, OlivierSTEINER, MoritzROS, Pere Barlet

This book constitutes the refereed proceedings of the 7th International Workshop on Traffic Monitoring and Analysis, TMA 2015, held in Barcelona, Spain, in April 2015. The 16 full papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections on measurement tools and methods; mobile and wireless; Web; security; an…

Edition
-
ISBN/ISSN
978-3-319-17172-2
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Traceback and Anonymity
Comment Share
WANG, XinyuanREEVES,

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of…

Edition
-
ISBN/ISSN
978-1-4939-3441-6
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Cutaneous haptic feedback in robotic teleoperation
Comment Share
Claudio Pacchierotti

This work addresses the challenge of providing effective cutaneous haptic feedback in robotic teleoperation, with the objective of achieving the highest degree of transparency whilst guaranteeing the stability of the considered systems. On the one hand, it evaluates teleoperation systems that provide only cutaneous cues to the operator, thus guaranteeing the highest degree of safety. This cutan…

Edition
-
ISBN/ISSN
9783319254579
Collation
-
Series Title
-
Call Number
004
Availability0
Add to basket
MARC DownloadCite
cover
Cyber denial, deception and counter deception : a framework for supporting ac…
Comment Share
Kristin E. HeckmanFrank J. StechRoshan K. Thomas

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D & D) techniques and their orchestration in service of an organization's mission. Concepts for cyber…

Edition
-
ISBN/ISSN
9783319251332
Collation
xv, 251 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Informatics in Schools. Curricula, Competences, and Competitions 8th Interna…
Comment Share
BRODNIK,AndrejVAHRENHOLD, Jan

This book constitutes the refereed proceedings of the 8th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2015, held in Ljubljana, Slovenia, in September/October 2015. The 14 full papers presented together with 3 invited talks were carefully reviewed and selected from 36 submissions. The focus of the conference was on following topics: sustainab…

Edition
-
ISBN/ISSN
978-3-319-25395-4
Collation
XVI, 183
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Cyber operations : building, defending, and attacking modern computer networks
Comment Share
Mike O'Leary

Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will en…

Edition
-
ISBN/ISSN
9781484242940
Collation
xxxi, 1136 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber security and privacy
Comment Share
Cyber Security and Privacy EU ForumFrances Cleary

This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as security and privacy in the cloud; security and privacy technologies…

Edition
-
ISBN/ISSN
9783319253602
Collation
xvi, 151 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber security : analytics, technology and automation
Comment Share
Martti LehtoP. Neittaanmäki

Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomen…

Edition
-
ISBN/ISSN
9783319183022
Collation
-
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
cover
Cyber warfare : building the scientific foundation
Comment Share
Paulo ShakarianSushil Jajodia

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rig…

Edition
-
ISBN/ISSN
9783319140391
Collation
xiii, 321 pages
Series Title
-
Call Number
005.8
Availability0
Add to basket
MARC DownloadCite
First Page Previous 76 77 78 79 80 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?