OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 211 from your keywords: subject="security"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Det…
Comment Share
Sargsyan, GoharKavallieros, DimitriosKolokotronis, Nicholas

The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gain…

Edition
Ed. 1
ISBN/ISSN
9781680838343, 9781680838350
Collation
234
Series Title
NowOpen
Call Number
005.8 SEC s
Availability0
Add to basket
MARC DownloadCite
cover
Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools
Comment Share
JOANNA, KołodziejMATLEO, RepettoARMEND, Duzha

This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architecture…

Edition
-
ISBN/ISSN
9783031040368
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Aspect-Oriented Security Hardening of UML Design Models
Comment Share
MOUHEB, Djedjiga

This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security h…

Edition
Ed. 1
ISBN/ISSN
978-3-319-16106-8
Collation
XVIII, 237
Series Title
-
Call Number
005.1 ASP a
Availability0
Add to basket
MARC DownloadCite
cover
Innovative Security Solutions for Information Technology and Communications …
Comment Share
SIMION, EmilBICA, IonNACCACHE, David

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algori…

Edition
-
ISBN/ISSN
978-3-319-27178-1
Collation
XXIV, 281
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Information and Communications Security 16th International Conference, ICICS…
Comment Share
HUI,Lucas C. K.QING,S. H.SHI, ElaineYIU, S. M.

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applicati…

Edition
-
ISBN/ISSN
978-3-319-21965-3
Collation
X, 321
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Information and Communication Technology Third IFIP TC 5/8 International Con…
Comment Share
KHALIL,IsmailNEUHOLD,ErichTJOA,A MinXU,Li DaYOU, Ilsun

This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2015, held as par…

Edition
-
ISBN/ISSN
978-3-319-24314-6
Collation
XIV, 354
Series Title
-
Call Number
004 INF
Availability0
Add to basket
MARC DownloadCite
cover
Russia's Turn to the East Domestic Policymaking and Regional Cooperation
Comment Share
HELGE, BlakkisrudELANA, Wilson Rowe

Development studies; Russia; Far East; International affairs; Energy; Shanghai cooperation organization; Economic development; Security policy; Multilateral organizations; Diplomacy; Regionalism; Russian–European relations; Russia’s “pivot to the East”; Annexation of Crimea; Regional politics; Eurasia; Ukraine; Sanctions regime; Foreign policy

Edition
-
ISBN/ISSN
9783319697901
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trustworthy Computing and Services International Conference, ISCTCS 2014, Be…
Comment Share
YUEMING, LuWU, XUZANG, XI

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building;…

Edition
-
ISBN/ISSN
978-3-662-47401-3
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, …
Comment Share
YUNG, MotiZHU, LiehuangYANG, Yanjiang

Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…

Edition
-
ISBN/ISSN
978-3-319-27998-5
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trusted Computing for Embedded Systems
Comment Share
CANDAELE, BernardANAGNOSTOPOULOS, IraklisSOUDRIS, Dimitrios

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. …

Edition
-
ISBN/ISSN
978-3-319-09420-5
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?