Genrer
Pris
DKK
Formater
  • 999+
  • 999+
  • 141
  • 36
  • 3
  • 2
  • 1
Sprog
  • 38
  • 999+
  • 2
  • 100
  • 3
  • 17
  • 1

Web

  • Fake It af Pernille Tranberg Spar 10%
    - Din online identitet er guld værd. Sådan passer du på den.
    af Pernille Tranberg & Steffan Heuer

    Tænker du nogen sinde over, hvem der ved hvad om dig på nettet? At din færden på hjemmesider og brug af apps kan få konsekvenser for, om du kommer ind på den bedste uddannelse, får det gode job og modtager de bedste tilbud på alt fra rejser til forsikring?I hverdagen derhjemme, på arbejdspladsen, i fitnesscentret, i skolen, når du rejser, dater, surfer porno og shopper. Du bliver konstant overvåget og registreret online. Og du opdager det sjældent. Når Google, Facebook, Twitter og co. gratis lader dig søge, e-maile og holde kontakt, er det alt andet end gratis. Du betaler med dine persondata – også kaldet nutidens olie. Virksomheder samler og videresælger informationer om dine interesser, smag, religion, alder, politiske overbevisning, helbred, seksuelle orientering, venner osv. De tjener milliarder på din identitet.Fake it fortæller dig, hvordan du passer på din identitet og dit omdømme online. Hvem holder øje med dig, hvad der sker med dine personlige data, og hvilke værktøjer kan du bruge - fx slette cookies, browse anonymt og skjule dig bag pseudonym. Det er et lynkursus i digitalt selvforsvar i den kommercielle kampzone.

  • Content Marketing Bogen af Signe Damgaard Jepsen
    - Sådan skaber du historier og relationer, der giver efterspørgsel
    af Signe Damgaard Jepsen & Joakim Ditlev

    Den første danske bog om content marketing nu i opdateret udgave.Markedsføring, der automatisk udvider dit marked. Sådan bliver content marketing omtalt over hele verden. Nu udkommer den første danske bog om emnet med danske cases som bilka.dk, Aarstiderne og Jyske Bank. I dag har forbrugere mere regnekraft i smartphonen, end hele NASA havde under den første månelanding. Med information tilgængelig altid og bullshit­detektorer så store som Rundetårn nytter det ikke at blæse med varm salgsgas. Dine kunder kan og vil gennemskue dig. Den gode nyhed er, at kunderne mere end nogensinde før er interesserede i at handle med virksomheder, der hjælper dem. Content marketing er metoden til at skabe interesse for dine produkter ved at lave engage­rende eller underholdende indhold, som relaterer sig til dine produkter. Content Marketing Bogen klæder dig på til at øge efter­spørgslen gennem nyttigt og målrettet indhold. Den er skrevet til dig, der arbejder professionelt med marke­ting eller kommunikation, og som tænker: »Vi må kunne gøre opmærksom på os selv på en mere effektiv måde uden at forstyrre vores kunder.«Content Marketing Bogen udkom 20. juni 2014 og er den første bog på dansk om emnet. Skrevet af danskere, med danske eksempler og i en dansk kontekst. Bogen fokuserer på, hvordan virksomheder kan få salgssucces online ved at skabe nyttigt og underholdende indhold for deres kunder. I en blanding mellem teori og praksis får læseren konkrete værktøjer og idéer til at komme i gang med content marketing og hvordan man håndterer forandringen fra traditionel markedsføring til content marketing, der sætter kunden i sætning. Samtidig indeholder bogen også opskrifter på, hvordan content marketing hænger sammen med sociale medier og søgemaskineoptimering og hvordan organisationen bliver klar til at dyrke content marketing. Forfatterne har rejst rundt i landet og talt med kommunikations- og marketingfolk i hele landet om, hvordan de udvider deres marked ved hjælp af godt indhold. Eksempler og cases i bogen er:bilka.dkAarstiderne.comJyske BankUnisportColumbus CLC bio Responsible Procurement Excellence3byggetilbud.dkTravelmarketAS3 TransitionForord af Andrew Davis, forfatteren til Brandscaping. Om forfatterne:SIGNE DAMGAARD JEPSEN har været journalist og redaktionsleder i mere end 10 år, så content er hendes hjemmebane. Hun lever af at hjælpe andre med at lave bedre content på det strategiske og praktiske niveau – uanset om det er som marketing, konferencer, kom­munikation eller kontakt til kunder. JOAKIM DITLEV er en pioner inden for content marke­ting i Danmark. Han ermarketingkonsulent og foredrags­holder og hjælper virksomheder med at udtænke og gennemføre indholdsbaserede marketingstrategier. Hans blog – contentmarketing.dk – er landets største kilde til nyheder og cases om content marketing.

  • Fake It (English Version) af Pernille Tranberg Spar 10%
    - Your Online Identity Is Worth Gold. Guide to Digital Selfdefense
    af Pernille Tranberg & Steffan Heuer

    Do you ever think about who knows what about you? That whenever you are online, on the web or using apps, your behaviour can affect your chances of landing a great job or losing it, being accepted at the school of your dreams, or receiving the best price for your insurance policy or a simple airline ticket?At home, at work, at school. Where you’re jogging or dating, shopping or searching, streaming music or simply reading something. You are constantly tracked - most often without you noticing or knowing about it. When Google, Facebook, Twitter and Co. let you find information, stay in touch and entertain yourself it is by no means free. You pay with your personal data - today’s oil. Companies feast on your digital identity. They mine, store and sell information about your interests, tastes, religion, age, political belief, health, sexual orientation, even your friends. And they make billions scraping together the pieces of your identity. Fake It guides you through the maze and madness of oversharing. How to take care of your identity and reputation online. Who keeps an eye on you and why. What happens to your data, and which tools can you use, such as blocking cookies and trackers, disconnecting social buttons and - most importantly - using more identities, hiding behind pseudonyms and aliases. Your privacy is more important than the terms of service dictated by for-profit entities.

  • Internetworking with TCP/IP Volume One: Pearson New International Edition af Douglas E Comer
    af Douglas E Comer

    An internationally best-selling, conceptual introduction to the TCP/IP protocols and Internetworking, this book interweaves a clear discussion of fundamentals and scientific principles with details and examples drawn from the latest technologies. Leading author Douglas Comer covers layering and packet formats for all the Internet protocols, includingTCP, IPv4, IPv6, DHCP, and DNS. In addition, the text explains new trends in Internet systems, including packet classification, Software Defined Networking (SDN), and mesh protocols used in The Internet of Things.The text is appropriate for individuals interested in learning more about TCP/IP protocols, Internet architecture, and current networking technologies, as well as engineers who build network systems. It is suitable for junior to graduate-level courses in Computer Networks, Data Networks, Network Protocols, and Internetworking.

  • Det Intelligente Hjem af Mogens Kahr Nielsen Spar 15%
    af Mogens Kahr Nielsen

    En gang talte man om fremtidens intelligente hjem eller fremtidens automatiserede hjem. Man talte om hvad der ville blive muligt eller måske allerede var muligt, men teknisk kompliceret. I dag er det ikke fremtiden. I dag er det meste muligt, man skal bare være opmærksom på, at de valg man træffer er de rigtige valg, så man ikke kommer til at træde sig selv over tæerne.? Bogen gennemgår i første del en række standarder for hjemmeautomatisering. I den anden del gives en række konkrete eksempler på automatisering af hjemmet med udgangspunkt i standarden Z-wave og et system fra firmaet Micasaverde. Hovedfokus er på områder som energi/varmestyring, styring af lys, overvågning, tyverialarmering, videregivelse af oplysninger om aktuel status på hjemmeautomatisering via SMS eller andre notifikationstyper etc. Læs evt mere på www.facebook.com/detintelligentehjem.

  • Network Better af Marchant Jeremy Marchant Spar 21%
    - How to meet, connect & grow your business
    af Marchant Jeremy Marchant

    Most books and presentations on networking stick to its behavioural aspects. This approach is necessary but not sufficient. Successful networking is about the successful initiation and nurturing of relationships with other business people, which requires emotional intelligence and an understanding of how to apply it in order to sustain networking relationships. When networking is not going well (or at all), many businesspeople's response is 'OK, I'm doing what you told me. How come it isn't working?' The answer is that people don't so much need behavioural tips (though these are always useful and are included in this book), they need to understand why they are getting in their own way, and how to move aside.On the whole, people don't successfully change their behaviour without understanding why they should. Network Better provides the necessary insight into what's going on as well as many practical, tried-and-tested suggestions and encouragements to enable you to do just that.

  • You're Not Broke You're Pre-Rich af Emilie Bellet
    - How to streamline your finances, stay in control of your bank balance and have more
    af Emilie Bellet

    "e;This book is a wise investment"e;Financial Times "e;A marvellous money manifesto"e; Helena Morrissey DBE, financier & founder of 30% clubOne out of three millennials today will never be able to buy their own house. Does it have to be like this? You're Not Broke You're Pre-Rich will tell you that it really doesn't; you can have your avocado on toast and stop renting and start saving too. In this book you will learn how to :Rent smartBuy a homeGet a better salaryManage a credit cardUnderstand your net worth / credit scoreSave more moneyLive within your budgetBuild a pensionInvestPay off your debt foreverThis essential handbook will help debunk the financial jargon and break the money taboo. Packed with actionable tips and no-nonsense practical advice, You're Not Broke You're Pre-Rich will teach you how to make your savings work for you, how you could invest your money, why you need to understand your pension and why your financial health is just as important as your mental and physical health.This indispensable manual will be your comprehensive guide to financial freedom, giving you the confidence and conviction to regain control of your bank balance and live a happier, richer life.

  • PCI DSS: A pocket guide, sixth edition af Alan Calder
    af Alan Calder & Geraint Williams

    An ideal introduction to PCI DSS v3.2.1All businesses that accept payment cards are prey for criminal hackers trying to steal financial information and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card payments in a way that effectively protects cardholder data.All organisations that accept, store, transmit or process cardholder data must comply with the Standard; failure to do so can have serious consequences and expensive repercussions. These range from customer desertion and brand damage to significant financial penalties and operating restrictions imposed by their acquiring bank.Covering PCI DSS v3.2.1, this handy pocket guide provides all the information you need to consider as you approach the Standard. It is also an ideal training resource for those in your organisation involved with payment card processing. Topics include:An overview of PCI DSS v3.2.1How to comply with the requirements of the StandardMaintaining complianceThe PCI SAQ (self-assessment questionnaire)The PCI DSS and ISO 27001Procedures and qualificationsAn overview of the PA-DSS (Payment Application Data Security Standard)PTS (PIN Transaction Security)Software-based PIN entryBuy your copy of this quick-reference guide to PCI DSS v3.2.1 today!About the authorsAlan Calder is a leading author on IT governance and information security issues. He is the CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd.Alan is an acknowledged international cyber security guru. He is a frequent media commentator on information security and IT governance issues, and has contributed articles and expert comment to a wide range of trade, national and online news outlets.Geraint Williams is the CISO for the GRC International Group of companies, and a knowledgeable and experienced senior information security consultant and former PCI QSA, with a strong technical background and experience in the PCI DSS and security testing.Geraint has provided consultancy on implementing the PCI DSS, and has conducted audits for a wide range of merchants and service providers as well as penetration testing and vulnerability assessments for clients. He has broad technical knowledge of security and IT infrastructure, including high-performance computing and Cloud computing. His certifications include CISSP and PCIP.

  • Information Security Risk Management for ISO 27001/ISO 27002, third edition af Alan Calder Spar 10%
    af Alan Calder & Steve Watkins

    Protect your information assets with effective risk managementIn today's information economy, the development, exploitation and protection of informationand associatedassets are key to the long-term competitiveness and survival of corporations and entire economies. The protection of informationand associatedassets - information security - is therefore overtaking physical asset protection as a fundamental corporate governance responsibility.Information security management system requirementsISO 27000, which provides an overview for the family of international standards for information security, states that "e;An organisation needs to undertake the following steps in establishing, monitoring, maintaining and improving its ISMS [] assess information security risks and treat information security risks"e;. The requirements for an ISMS are specified in ISO 27001. Under this standard, a risk assessment must be carried out to inform the selection of security controls, making risk assessment the core competence of information security management and a critical corporate discipline.Plan and carry out a risk assessment to protect your informationInformation Security Risk Management for ISO 27001 / ISO 27002:Provides information security and risk management teams with detailed, practical guidance on how to develop and implement a risk assessment in line with the requirements of ISO 27001.Draws on national and international best practice around risk assessment, including BS 7799-3:2017 (BS 7799-3).Covers key topics such as risk assessment methodologies, risk management objectives, information security policy and scoping, threats and vulnerabilities, risk treatment and selection of controls.Includes advice on choosing risk assessment software.Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework for their organisation and deliver real, bottom-line business benefits.Buy your copy today!About the authorsAlan Calderis the Group CEO of GRCInternational Groupplc, the AIM-listed company that owns IT GovernanceLtd.Alan is an acknowledged international cyber security guru and a leadingauthor on information security and IT governance issues. He has beeninvolved in the development of a wide range of information security managementtraining courses that have beenaccredited by IBITGQ (International Boardfor IT Governance Qualifications). Alan has consulted for clientsin the UK andabroad, andis a regular media commentator and speaker.Steve Watkins is an executive director at GRC International Group plc. He is a contracted technical assessor for UKAS - advising on its assessments of certification bodies offering ISMS/ISO 27001 and ITSMS/ISO 20000-1 accredited certification. He is a member of ISO/IEC JTC 1/SC 27, the international technical committee responsible for information security, cyber security and privacy standards,and chairs the UK National Standards Body's technical committee IST/33 (information security, cyber security and privacy protection) that mirrors it. Stevewas an active member ofIST/33/-/6, which developed BS 7799-3.

  • California Consumer Privacy Act (CCPA) af Preston Bukaty Spar 10%
    - An implementation guide
    af Preston Bukaty

    Understand the CCPA (California Consumer Privacy Act) and how to implement strategies to comply with this privacy regulation.Established in June 2018, the CCPA was created to remedy the lack of comprehensive privacy regulation in the state of California. When it comes into effect on January 1, 2020, the CCPA will give California residents the right to:Learn what personal data a business has collected about themUnderstand who this data has been disclosed toFind out whether their personal data has been sold to third parties, and who these third parties areOpt out of such data transactions, or request that the data be deleted.Many organizations that do business in the state of California must align to the provisions of the CCPA. Much like the EU's GDPR (General Data Protection Regulation), businesses that fail to comply with the CCPA will face economic penalties.Prepare your business for CCPA compliance with our implementation guide that:Provides the reader with a comprehensive understanding of the legislation by explaining key termsExplains how a business can implement strategies to comply with the CCPADiscusses potential developments of the CCPA to further aid complianceYour guide to understanding the CCPA and how you can implement a strategy to comply with this legislation - buy this book today to get the guidance you need!About the authorPreston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by international regulatory frameworks. Having conducted more than 3,000 data mapping audits, he also understands the practical realities of project management in operationalizing compliance initiatives.Preston's legal experience andenthusiasmfor technology make him uniquely suited to understanding the business impact of privacy regulations such as theGeneral Data Protection Regulation (GDPR)andthe California Consumer Privacy Act (CCPA).He has advised more than 250 organizations engaged in businesses as varied as SaaS platforms, mobile geolocation applications, GNSS/telematics tools, financial institutions, fleet management software, architectural/engineering design systems, and web hosting. He also teaches certification courses on GDPR compliance and ISO 27001implementation, andwrites on data privacy law topics.Preston lives in Denver, Colorado. Prior to working as a data privacy consultant, he worked for an international GPS software company, advising business areas on compliance issues across 140 countries. Preston holds a juris doctorate from the University of Kansas School of Law, along with a basketball signed by Hall of Fame coach Bill Self.

  • concise introduction to the NIS Directive af Alan Calder
    - A pocket guide for digital service providers
    af Alan Calder

    This pocket guide is an introduction to the EU's NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance. This pocket guide is a primer for any DSP that needs to comply with the NIS Directive.The pocket guide helps DSPs:Gain insight into the NIS Directive and who is regulating it;Identify if they are within the scope of the Directive;Understand the key requirements; andUnderstand how guidance from international standards and ENISA can help them comply.Your essential guide to understanding the EU's NISDirective - buy this book today and get the help and guidance you need.

  • concise introduction to the NIS Directive af Alan Calder
    - A pocket guide for digital service providers
    af Alan Calder

    This pocket guide is an introduction to the EU's NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance. This pocket guide is a primer for any DSP that needs to comply with the NIS Directive.The pocket guide helps DSPs:Gain insight into the NIS Directive and who is regulating it;Identify if they are within the scope of the Directive;Understand the key requirements; andUnderstand how guidance from international standards and ENISA can help them comply.Your essential guide to understanding the EU's NISDirective - buy this book today and get the help and guidance you need.

  • Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers af Alan Calder
    af Alan Calder

    This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.An introduction to the new NIS Regulations 2018 that bring the EU's NIS Directive and Implementing Regulation into UK law. This guide outlines the key requirements, details exactly which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance.This guide will help you:Clarify how to identify if you are within the scope of the NIS RegulationsGain an insight into the NIS DirectiveUnravel the key definitions, authorities and points of contactUnderstand the benefits of a good cyber resilience planYour essential guide to understanding the NIS Regulations - buy this book today and get the help and guidance you need.

  • Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers af Alan Calder
    af Alan Calder

    This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.An introduction to the new NIS Regulations 2018 that bring the EU's NIS Directive and Implementing Regulation into UK law. This guide outlines the key requirements, details exactly which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance.This guide will help you:Clarify how to identify if you are within the scope of the NIS RegulationsGain an insight into the NIS DirectiveUnravel the key definitions, authorities and points of contactUnderstand the benefits of a good cyber resilience planYour essential guide to understanding the NIS Regulations - buy this book today and get the help and guidance you need.

  • Edge Computing - EDGE 2018
    - Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
     

    This book constitutes the proceedings of the International Conference on Edge Computing, EDGE 2018, held in Seattle, WA, USA, in June 2018. The 9 full papers and 3 short paper presented in this volume were carefully reviewed and selected from 29 submissions. The contributions are organized in topical sections named: Research Track; Application and Industry Track; and Short Paper Track. They deal with the latest fundamental advances in the state of the art and practice of edge computing.

  • Wireless Algorithms, Systems, and Applications
    - 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings
     

    This book constitutes the proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2018, held in Tianjin, China, in June 2018.The 59 full papers and 18 short papers presented in this book were carefully reviewed and selected from 197 submissions. The papers cover various topics such as cognitive radio networks; wireless sensor networks; cyber-physical systems; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobile cloud computing; topology control and coverage; security and privacy; underwater and underground networks; vehicular networks; internet of things; information processing and data management; programmable service interfaces; energy-efficient algorithms; system and protocol design; operating system and middle-ware support; and experimental test-beds, models and case studies.

  • Web Services - ICWS 2018
    - 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
     

    This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 116 submissions. They are organized in topical sections such as Web Services, RESTful web services, Web Services Description Langugage, Universal Description Discovery and Integration, Service discovery and interfaces, Domain-specific security and privacy architectures, Location bases services, Sercurity Services and Markup languages. 

  • Cyber Security Cryptography and Machine Learning
    - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings
     

    This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018.The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.

  • Computational Science - ICCS 2018
    - 18th International Conference, Wuxi, China, June 11-13, 2018 Proceedings, Part III
     

    The three-volume set LNCS 10860, 10861 and 10862 constitutes the proceedings of the 18th International Conference on Computational Science, ICCS 2018, held in Wuxi, China, in June 2018.The total of 155 full and 66 short papers presented in this book set was carefully reviewed and selected from 404 submissions. The papers were organized in topical sections named: Part I: ICCS Main TrackPart II: Track of Advances in High-Performance Computational Earth Sciences: Applications and Frameworks; Track of Agent-Based Simulations, Adaptive Algorithms and Solvers; Track of Applications of Matrix Methods in Artificial Intelligence and Machine Learning; Track of Architecture, Languages, Compilation and Hardware Support for Emerging ManYcore Systems; Track of Biomedical and Bioinformatics Challenges for Computer Science; Track of Computational Finance and Business Intelligence; Track of Computational Optimization, Modelling and Simulation; Track of Data, Modeling, and Computation in IoT and Smart Systems; Track of Data-Driven Computational Sciences; Track of Mathematical-Methods-and-Algorithms for Extreme Scale; Track of Multiscale Modelling and SimulationPart III: Track of Simulations of Flow and Transport: Modeling, Algorithms and Computation; Track of Solving Problems with Uncertainties; Track of Teaching Computational Science; Poster Papers

  • Detection of Intrusions and Malware, and Vulnerability Assessment
    - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings
     

    This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.

  • Applied Cryptography and Network Security
    - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
     

    This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018.The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.

  • Information Systems Security and Privacy
    - Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers
     

    This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2017, held in Porto, Portugal, in February 2017. The 13 full papers presented were carefully reviewed and selected from a total of 100 submissions. They are dealing with topics such as vulnerability analysis and countermeasures, attack patterns discovery and intrusion detection, malware classification and detection, cryptography applications, data privacy and anonymization, security policy analysis, enhanced access control, and socio-technical aspects of security.

  • Theory and Practice of Model Transformation
    - 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25-26, 2018, Proceedings
     

    This book constitutes the refereed proceedings of the 11th International Conference on Model Transformation, ICMT 2018, held as part of STAF 2018, in Toulouse, France, in June 2018.The 9 full papers were carefully reviewed and selected from 24 submissions. This book also presents 1 invited paper. The papers include research, application, and tool demonstration papers presented in the context of four sessions on verification of model transformations, model transformation tools, transformation reuse and graph transformations.

  • Medical Imaging and its Security in Telemedicine Applications af Rohit Thanki
    af Rohit Thanki & Surekha Borra

    This book introduces medical imaging, its security requirements, and various security mechanisms using data hiding approaches. The book in particular provides medical data hiding techniques using various advanced image transforms and encryption methods. The book focuses on two types of data hiding techniques: steganography and watermarking for medical images. The authors show how these techniques are used for security and integrity verification of medical images and designed for various types of medical images such as grayscale image and color image. The implementation of techniques are done using discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), redundant DWT (RDWT), fast discrete curvelet transform (FDCuT), finite ridgelet transform (FRT) and non-subsampled contourlet transform (NSCT). The results of these techniques are also demonstrated after description of each technique. Finally, some future research directions are provided for security of medical images in telemedicine application.

  • Information Security Applications
    - 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers
     

    This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017.The 12 revised full papers and 15 short papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections such as attack and defense; theory in security; web security and emerging technologies; systems security and authentication; crypto protocols; and attack detections and legal aspects.

  • Tests and Proofs
    - 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings
     

    This book constitutes the refereed proceedings of the 12th International Conference on Tests and Proofs, TAP 2018, held as part of STAF 2018, in Toulouse, France, in June 2018. The 8 regular papers, 2 short papers, 1 invited paper and 1 invited tutorial presented in this volume were carefully reviewed and selected from 18 submissions. The TAP conference promotes research in verification and formal methods that targets the interplay of proofs and testing: the advancement of techniques of each kind and their combination, with the ultimate goal of improving software and system dependability.

  • Privacy and Identity Management. The Smart Revolution
    - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers
     

    This book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2017.The 12 revised full papers, 5 invited papers and 4 workshop papers included in this volume were carefully selected from a total of 48 submissions and were subject to a three-phase review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. They are organized in the following topical sections: privacy engineering; privacy in the era of the smart revolution; improving privacy and security in the era of smart environments; safeguarding personal data and mitigating risks; assistive robots; and mobility and privacy.

  • Introduction to Security Reduction af Fuchun Guo
    af Fuchun Guo, Willy Susilo & Yi Mu

    This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

  • Future Access Enablers for Ubiquitous and Intelligent Infrastructures
    - Third International Conference, FABULOUS 2017, Bucharest, Romania, October 12-14, 2017, Proceedings
     

    This book constitutes the refereed post-conference proceedings of the Third International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2017, held in Bucharest, Romania, in October 2017. The 37 revised full papers were carefully reviewed and selected from 61 submissions. The main topics deal with future access networks, Internet of Things and smart city/smart environment applications, communications and computing infrastructures, security aspects in communication and data processing, signal processing and multimedia.

  • Computer Networks
    - 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings
     

    This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.