OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 214 from your keywords: subject="security"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Computational Red Teaming Risk Analytics of Big-Data-to-Decisions Intelligent…
Comment Share
Hussein A. Abbass

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).℗ℓ The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shad…

Edition
-
ISBN/ISSN
9783319082806
Collation
xxiii, 218 pages
Series Title
-
Call Number
004
Availability0
Add to basket
MARC DownloadCite
cover
Challenges in Cybersecurity and Privacy - the European Research Landscape
Comment Share
Bernabe, Jorge BernalSkarmeta, Antonio

Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness…

Edition
Ed. 1
ISBN/ISSN
9781000795509, 9788770220880
Collation
250
Series Title
-
Call Number
005.8 CHA c
Availability0
Add to basket
MARC DownloadCite
cover
Understanding Network Hacks Attack and Defense with Python
Comment Share
BALLMANN, Bastian

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…

Edition
-
ISBN/ISSN
978-3-662-44437-5
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Det…
Comment Share
Sargsyan, GoharKavallieros, DimitriosKolokotronis, Nicholas

The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gain…

Edition
Ed. 1
ISBN/ISSN
9781680838343, 9781680838350
Collation
234
Series Title
NowOpen
Call Number
005.8 SEC s
Availability0
Add to basket
MARC DownloadCite
cover
Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools
Comment Share
JOANNA, KołodziejMATLEO, RepettoARMEND, Duzha

This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architecture…

Edition
-
ISBN/ISSN
9783031040368
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Aspect-Oriented Security Hardening of UML Design Models
Comment Share
MOUHEB, Djedjiga

This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security h…

Edition
Ed. 1
ISBN/ISSN
978-3-319-16106-8
Collation
XVIII, 237
Series Title
-
Call Number
005.1 ASP a
Availability0
Add to basket
MARC DownloadCite
cover
Innovative Security Solutions for Information Technology and Communications …
Comment Share
SIMION, EmilBICA, IonNACCACHE, David

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algori…

Edition
-
ISBN/ISSN
978-3-319-27178-1
Collation
XXIV, 281
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Information and Communications Security 16th International Conference, ICICS…
Comment Share
HUI,Lucas C. K.QING,S. H.SHI, ElaineYIU, S. M.

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applicati…

Edition
-
ISBN/ISSN
978-3-319-21965-3
Collation
X, 321
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Information and Communication Technology Third IFIP TC 5/8 International Con…
Comment Share
KHALIL,IsmailNEUHOLD,ErichTJOA,A MinXU,Li DaYOU, Ilsun

This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, held as par…

Edition
-
ISBN/ISSN
978-3-319-24314-6
Collation
XIV, 354
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Russia's Turn to the East Domestic Policymaking and Regional Cooperation
Comment Share
HELGE, BlakkisrudELANA, Wilson Rowe

Development studies; Russia; Far East; International affairs; Energy; Shanghai cooperation organization; Economic development; Security policy; Multilateral organizations; Diplomacy; Regionalism; Russian–European relations; Russia’s “pivot to the East”; Annexation of Crimea; Regional politics; Eurasia; Ukraine; Sanctions regime; Foreign policy

Edition
-
ISBN/ISSN
9783319697901
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?