OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 211 from your keywords: subject="security"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Technology and privacy :the new landscape
Comment Share
Agre, Philip.Rotenberg, Marc.

Annotation Privacy is the capacity to negotiate social relationships by controlling access to personal information. As laws, policies, and technological design increasingly structure people's relationships with social institutions, individual privacy faces new threats and new opportunities. Over the last several years, the realm of technology and privacy has been transformed, creating a landsca…

Edition
-
ISBN/ISSN
0585003262
Collation
1 online resource (vi, 325 pages) :illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Watermarking Security
Comment Share
BAS, PatrickFURON, TeddyCAYRE, FrançoisDOERR, Gwenaël

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their waterm…

Edition
-
ISBN/ISSN
978-981-10-0506-0
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
VoIP and PBX Security and Forensics A Practical Approach
Comment Share
ANDROULIDAKIS, osif I.

This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…

Edition
-
ISBN/ISSN
978-3-319-29721-7
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Visual Cryptography for Image Processing and Security Theory, Methods, and A…
Comment Share
LIU, FengYAN, Wei Qi

This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with ne…

Edition
-
ISBN/ISSN
978-3-319-23473-1
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Violence in Nigeria Patterns and Trends
Comment Share
TAFT, PatriciaHAKEN, Nate

This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative spatial-temporal distribution of conflict factors in Nigeria. The analysis of violence at state and local levels reveals a fractal pattern of…

Edition
-
ISBN/ISSN
978-3-319-14935-6
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Enterprise Risk Management in International Construction Operations
Comment Share
ZHAO, XianboHWANG, Bon-GangLOW, Sui Pheng

This book provides readers an understanding of the implementation of Enterprise Risk Management (ERM) for international construction operations. In an extended case study, it primarily focuses on Chinese construction firms (CCFs) based in Singapore. In this regard, the book explains the differences and similarities between Risk Management (RM), Project Risk Management (PRM) and ERM in the const…

Edition
-
ISBN/ISSN
978-981-287-549-5
Collation
31 b/w illustrations, 32 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Cyber Security: The Lifeline of Information and Communication Technology
Comment Share
Ramjee Prasad

This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are gro…

Edition
1
ISBN/ISSN
978-3-030-31703-4
Collation
Komputer
Series Title
-
Call Number
004
Availability0
Add to basket
MARC DownloadCite
cover
Computational Red Teaming Risk Analytics of Big-Data-to-Decisions Intelligent…
Comment Share
Hussein A. Abbass

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).℗ℓ The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shad…

Edition
-
ISBN/ISSN
9783319082806
Collation
xxiii, 218 pages
Series Title
-
Call Number
004
Availability0
Add to basket
MARC DownloadCite
cover
Challenges in Cybersecurity and Privacy - the European Research Landscape
Comment Share
Bernabe, Jorge BernalSkarmeta, Antonio

Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness…

Edition
Ed. 1
ISBN/ISSN
9781000795509, 9788770220880
Collation
250
Series Title
-
Call Number
005.8 CHA c
Availability0
Add to basket
MARC DownloadCite
cover
Understanding Network Hacks Attack and Defense with Python
Comment Share
BALLMANN, Bastian

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…

Edition
-
ISBN/ISSN
978-3-662-44437-5
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?