Browse Results

Showing 11,176 through 11,200 of 53,836 results

Computer Security Basics, 2nd Edition

by Rick Lehtinen

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing. Topics include: Computer security concepts Security breaches, such as viruses and other malicious programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST

Computer Security Basics, 2nd Edition

by Rick Lehtinen G. T. Gangemi Sr.

<p>The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, <i>Computer Security Basics</i> 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. </p>

Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I (Lecture Notes in Computer Science #9326)

by Günther Pernul Peter Y A Ryan Edgar Weippl

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.

Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II (Lecture Notes in Computer Science #9327)

by Edgar Weippl Günther Pernul Peter Y A Ryan

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.

Computer Security. ESORICS 2021 International Workshops: CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers (Lecture Notes in Computer Science #13106)

by Sokratis Katsikas Costas Lambrinoudakis Nora Cuppens John Mylopoulos Christos Kalloniatis Weizhi Meng Steven Furnell Frank Pallas Jörg Pohle M. Angela Sasse Habtamu Abie Silvio Ranise Luca Verderame Enrico Cambiaso Jorge Maestre Vidal Marco Antonio Sotelo Monge

This book constitutes the refereed proceedings of six International Workshops that were held in conjunction with the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-6, 2021. The conference was initially planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic.The 32 papers included in these proceedings stem from the following workshops:the 7th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2021, which accepted 7 papers from 16 submissions;the 5th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2021, which accepted 5 papers from 8 submissions;the 4th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2021, which accepted 6 full and 1 short paper out of 15 submissions; the 3rd Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2021, which accepted 5 full and 1 short paper out of 13 submissions.the 2nd Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2021, which accepted 3 full and 1 short paper out of 6 submissions; and the 1st International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2021, which accepted 3 papers out of 7 submissions.The following papers are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com:Why IT Security Needs Therapy by Uta Menges, Jonas Hielscher, Annalina Buckmann, Annette Kluge, M. Angela Sasse, and Imogen VerretTransferring Update Behavior from Smartphones to Smart Consumer Devices by Matthias Fassl, Michaela Neumayr, Oliver Schedler, and Katharina Krombholz Organisational Contexts of Energy Cybersecurity by Tania Wallis, Greig Paul, and James Irvine SMILE - Smart eMaIl Link domain Extractor by Mattia Mossano, Benjamin Berens, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer, and Melanie Volkamer A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things by Salatiel Ezennaya-Gomez, Claus Vielhauer, and Jana Dittmann Data Protection Impact Assessments in Practice - Experiences from Case Studies by Michael Friedewald, Ina Schiering, Nicholas Martin, and Dara Hallinan

Computer Security. ESORICS 2022 International Workshops: CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13785)

by Sokratis Katsikas Frédéric Cuppens Christos Kalloniatis John Mylopoulos Frank Pallas Jörg Pohle M. Angela Sasse Habtamu Abie Silvio Ranise Luca Verderame Enrico Cambiaso Jorge Maestre Vidal Marco Antonio Sotelo Monge Massimiliano Albanese Basel Katt Sandeep Pirbhulal Ankur Shukla

This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022. The 39 papers included in these proceedings stem from the following workshops: 8th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2022, which accepted 8 papers from 15 submissions; 6th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2022, which accepted 2 papers from 5 submissions; Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2022, which accepted 4 full papers out of 13 submissions; Third Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2022, which accepted 9 full and 1 short paper out of 19 submissions; Second International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2022, which accepted 5 papers out of 8 submissions; First International Workshop on Election Infrastructure Security, EIS 2022, which accepted 5 papers out of 10 submissions; and First International Workshop on System Security Assurance, SecAssure 2022, which accepted 5 papers out of 10 submissions.

Computer Security. ESORICS 2023 International Workshops: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II (Lecture Notes in Computer Science #14399)

by Sokratis Katsikas Habtamu Abie Silvio Ranise Luca Verderame Enrico Cambiaso Rita Ugarelli Isabel Praça Wenjuan Li Weizhi Meng Steven Furnell Basel Katt Sandeep Pirbhulal Ankur Shukla Michele Ianni Mila Dalla Preda Kim-Kwang Raymond Choo Miguel Pupo Correia Abhishta Abhishta Giovanni Sileno Mina Alishahi Harsha Kalutarage Naoto Yanai

This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Netherlands, during September 25-29, 2023. The 22 regular papers included in these proceedings stem from the following workshops:9th International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2023, which accepted 8 papers from 18 submissions;18th International Workshop on Data Privacy Management, DPM 2023, which accepted 11 papers from 18 submissions;7th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2023, which accepted 6 papers from 20 submissions;7th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2023, which accepted 4 papers from 7 submissions.4th International Workshop onCyber-Physical Security for Critical Infrastructures Protection, CSPS4CIP 2023, which accepted 11 papers from 15 submissions.6th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2023, which accepted 6 papers from 10 submissions;Second International Workshop on System Security Assurance, SecAssure 2023, which accepted 5 papers from 8 submissions;First International Workshop on Attacks and Software Protection, WASP 2023, which accepted 7 papers from 13 submissionsInternational Workshop on Transparency, Accountability and User Control for a Responsible Internet, TAURIN 2023, which accepted 3 papers from 4 submissions;International Workshop on Private, Secure, and Trustworthy AI, PriST-AI 2023, which accepted 4 papers from 8 submissions;International Workshop on Security and Artificial Intelligence, SECAI 2023, which accepted 5 papers from 10 submissions.

Computer Security. ESORICS 2023 International Workshops: CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part I (Lecture Notes in Computer Science #14398)

by Sokratis Katsikas Frédéric Cuppens Nora Cuppens-Boulahia Costas Lambrinoudakis Joaquin Garcia-Alfaro Guillermo Navarro-Arribas Pantaleone Nespoli Christos Kalloniatis John Mylopoulos Annie Antón Stefanos Gritzalis

This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Netherlands, during September 25-29, 2023. The 22 regular papers included in these proceedings stem from the following workshops:9th International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2023, which accepted 8 papers from 18 submissions;18th International Workshop on Data Privacy Management, DPM 2023, which accepted 11 papers from 18 submissions;7th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2023, which accepted 6 papers from 20 submissions;7th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2023, which accepted 4 papers from 7 submissions.4th International Workshop onCyber-Physical Security for Critical Infrastructures Protection, CSPS4CIP 2023, which accepted 11 papers from 15 submissions.6th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2023, which accepted 6 papers from 10 submissions;Second International Workshop on System Security Assurance, SecAssure 2023, which accepted 5 papers from 8 submissions;First International Workshop on Attacks and Software Protection, WASP 2023, which accepted 7 papers from 13 submissionsInternational Workshop on Transparency, Accountability and User Control for a Responsible Internet, TAURIN 2023, which accepted 3 papers from 4 submissions;International Workshop on Private, Secure, and Trustworthy AI, PriST-AI 2023, which accepted 4 papers from 8 submissions;International Workshop on Security and Artificial Intelligence, SECAI 2023, which accepted 5 papers from 10 submissions.

Computer Security Literacy: Staying Safe in a Digital World

by Douglas Jacobson Joseph Idziorek

Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practica

Computer Service and Repair: A Guide to Upgrading, Configuring, Troubleshooting, and Networking Personal Computers

by Richard M. Roberts

Teaches the practices and principles needed to pass the A+ Certification Exams, as well as to build, upgrade, and troubleshoot your PC.

Computer Service And Repair, 4th Edition

by Richard M. Roberts

Computer Service and Repair is written for those who have no PC experience, as well as those technicians who have limited formal training. Written in an easy-to-understand format with hundreds of illustrations, Computer Service and Repair takes the reader from basic instruction to test preparation for the CompTIA A+ Certification exams. For those who want to learn computer networking, programming, administration, or any of the computer sciences, Computer Service and Repair is the perfect place to start.

Computer Simulation: A Foundational Approach Using Python (Chapman & Hall/CRC Computer and Information Science Series)

by Yahya Esmail Osais

Computer simulation is an effective and popular universal tool that can be applied to almost all disciplines. Requiring only basic knowledge of programming, mathematics, and probability theory, Computer Simulation: A Foundational Approach Using Python takes a hands-on approach to programming to introduce the fundamentals of computer simulation. The main target of the book is computer science and engineering students who are interested mainly in directly applying the techniques to their research problems. The book will be of great interest to senior undergraduate and starting graduate students in the fields of computer science and engineering and industrial engineering.

Computer Simulation Validation: Fundamental Concepts, Methodological Frameworks, and Philosophical Perspectives (Simulation Foundations, Methods and Applications)

by Claus Beisbart Nicole J. Saam

This unique volume introduces and discusses the methods of validating computer simulations in scientific research. The core concepts, strategies, and techniques of validation are explained by an international team of pre-eminent authorities, drawing on expertise from various fields ranging from engineering and the physical sciences to the social sciences and history. The work also offers new and original philosophical perspectives on the validation of simulations.Topics and features: introduces the fundamental concepts and principles related to the validation of computer simulations, and examines philosophical frameworks for thinking about validation; provides an overview of the various strategies and techniques available for validating simulations, as well as the preparatory steps that have to be taken prior to validation; describes commonly used reference points and mathematical frameworks applicable to simulation validation; reviews the legal prescriptions, and the administrative and procedural activities related to simulation validation; presents examples of best practice that demonstrate how methods of validation are applied in various disciplines and with different types of simulation models; covers important practical challenges faced by simulation scientists when applying validation methods and techniques; offers a selection of general philosophical reflections that explore the significance of validation from a broader perspective.This truly interdisciplinary handbook will appeal to a broad audience, from professional scientists spanning all natural and social sciences, to young scholars new to research with computer simulations. Philosophers of science, and methodologists seeking to increase their understanding of simulation validation, will also find much to benefit from in the text.

Computer Simulations in Molecular Biology (Scientific Computation)

by Hiqmet Kamberaj

This book covers a range of topics in quantum mechanics and molecular dynamics simulation, including computational modeling and machine learning approaches. The book also provides a Python GUI and tutorials for simulating molecular biological systems and presents case studies of quantum mechanics simulations for predicting electronic properties. Its pedagogical formatting makes it easy for students to understand and follow and has been praised for providing clear and detailed explanations of complex topics. This book is ideal for graduate students and researchers in theoretical and computational biophysics, physics, chemistry, and materials science, as well as postgraduates in applied mathematics, computer science, and bioinformatics.

Computer Simulations in Science and Engineering: Concepts - Practices - Perspectives (The Frontiers Collection)

by Juan Manuel Durán

This book addresses key conceptual issues relating to the modern scientific and engineering use of computer simulations. It analyses a broad set of questions, from the nature of computer simulations to their epistemological power, including the many scientific, social and ethics implications of using computer simulations. The book is written in an easily accessible narrative, one that weaves together philosophical questions and scientific technicalities. It will thus appeal equally to all academic scientists, engineers, and researchers in industry interested in questions (and conceivable answers) related to the general practice of computer simulations.

Computer Simulations of Space Societies (Space and Society)

by William Sims Bainbridge

At the intersection of astronautics, computer science, and social science, this book introduces the challenges and insights associated with computer simulation of human society in outer space, and of the dynamics of terrestrial enthusiasm for space exploration. Never before have so many dynamic representations of space-related social systems existed, some deeply analyzing the logical implications of social-scientific theories, and others open for experience by the general public as computer-generated virtual worlds. Fascinating software ranges from multi-agent artificial intelligence models of civilization, to space-oriented massively multiplayer online games, to educational programs suitable for schools or even for the world's space exploration agencies. At the present time, when actual forays by humans into space are scarce, computer simulations of space societies are an excellent way to prepare for a renaissance of exploration beyond the bounds of Earth.

Computer Studies class 11 - GSTB

by Gujarat State Board of School Textbooks

Written in simple english language, the Gujarat State Secondary and Higher Secondary Education Board has prepared new syllabi for class 11 based on the open source operating system and compatible open source software tools for various topics of Computer Studies. These syllabi are sanctioned by the Government of Gujarat.

Computer Studies class 9 - GSTB

by Gujarat State Board of School Textbooks

The Gujarat State Secondary and Higher Secondary Education Board has prepared new syllabi based on the open source operating system and compatible open source software tools for various topics of Computer Studies. These syllabi are sanctioned by the Government of Gujarat. It is a matter of pleasure for the Gujarat State Board of School Textbooks to place this textbook of Computer Studies before the students of Standard 9 prepared according to the new syllabus.

Computer Studies Part 1 class 10 - GSTB

by Gujarat State Board of School Textbooks

The Gujarat State Secondary and Higher Secondary Education Board has prepared new syllabi based on the open-source operating system and compatible open-source software tools for various topics of Computer Studies. These syllabi are sanctioned by the Government of Gujarat. The Part 1 of the textbook contains chapters 1 to 7.

Computer Studies Part 2 class 10 - GSTB

by Gujarat State Board of School Textbooks

The Gujarat State Secondary and Higher Secondary Education Board has prepared new syllabi based on the open-source operating system and compatible open-source software tools for various topics of Computer Studies. These syllabi are sanctioned by the Government of Gujarat. The Part 1 of the textbook contains chapters 8 to 16 and appendix 1 to 4.

Computer Support for Collaborative Learning: Foundations for A Cscl Community (cscl 2002 Proceedings)

by Gerry Stahl

Computer Support for Collaborative Learning (CSCL) is a field of study centrally concerned with meaning and the practices of meaning-making in the context of joint activity, and the ways in which these practices are mediated through designed artifacts. This volume includes abstracts of papers that were presented during interactive poster sessions at CSCL 2002. Documenting an extremely heterogeneous, productive phase of inquiry with broad social consequences, these proceedings reflect the current state of CSCL research--particularly in North America and Western Europe.

Computer-Supported Collaboration: Theory and Practice (IEEE Press Series on Human-Machine Systems)

by Weidong Huang Leila Alem Mark Billinghurst Chun Xiao Troels Rasmussen

Discover the latest developments in AR, VR, mobile, and wearable technologies for the remote guidance of physical tasks In Computer-Supported Collaboration: Theory and Practice, an expert team of researchers delivers the latest instruction in using augmented reality (AR), virtual reality (VR), and mobile or wearable technology to support remote guidance on physical tasks. The authors offer an overview of the field before moving on to discuss state-of-the-art research developments in everything from shared visual spaces to the use of hand gestures and gaze information for better collaboration. The book also describes the hardware devices, software tools, and libraries that can be used to help build remote guidance systems, as well as the industrial systems and applications that have been used in real world settings. Finally, Computer-Supported Collaboration includes a discussion of the current challenges faced by practitioners in the field and likely future directions for new research and development. Readers will also discover: A thorough introduction and review of the art of remote guidance research and engineering Comprehensive explorations of the shared visual space used to support common grounding and the remote guidance of physical tasks, as well as mobility support for local workers Practical discussions of mobility support of workers and helpers in remote guidance, including systems that support hands-free interaction In-depth explorations of communication cues in remote guidance, including systems that support gesturing and sketching on a touch-based display Perfect for researchers and professionals working in human-computer interaction or computer-supported collaborative work, Computer-Supported Collaboration: Theory and Practice is also an ideal resource for educators and graduate students teaching or studying in these fields.

Computer-Supported Collaborative Chinese Second Language Learning: Beyond Brainstorming (Chinese Language Learning Sciences)

by Yun Wen

This book explores the implementation of an online representational tool, GroupScribbles, in Chinese-as-a-second-language classrooms from primary school to secondary school. It demonstrates the effectiveness of combining online representational tools with face-to-face classroom learning, and provides a workable approach to analysing interactions interweaving social and cognitive dimensions, which take place in the networked classroom. A series of suggestions regarding networked second language learning will help educators effectively implement information and communication technology tools in the classroom.

Computer-Supported Collaborative Decision-Making (Automation, Collaboration, & E-Services #4)

by Florin Gheorghe Filip Constantin-Bălă Zamfirescu Cristian Ciurea

This is a book about how management and control decisions are made by persons who collaborate and possibly use the support of an information system. The decision is the result of human conscious activities aiming at choosing a course of action for attaining a certain objective (or a set of objectives). The act of collaboration implies that several entities who work together and share responsibilities to jointly plan, implement and evaluate a program of activities to achieve the common goals. The book is intended to present a balanced view of the domain to include both well-established concepts and a selection of new results in the domains of methods and key technologies. It is meant to answer several questions, such as: a) "How are evolving the business models towards the ever more collaborative schemes?"; b) "What is the role of the decision-maker in the new context?" c) "What are the basic attributes and trends in the domain of decision-supporting information systems?"; d) "Which are the basic methods to aggregate the individual preferences?" e)"What is the impact of modern information and communication technologies on the design and usage of decision support systems for groups of people?".

Computer-Supported Collaborative Learning at the Workplace: CSCL@Work (Computer-Supported Collaborative Learning Series #14)

by Volker Wulf Isa Jahnke Sean P. Goggins

This book is an edited volume of case studies exploring the uptake and use of computer supported collaborative learning in work settings. This book fills a significant gap in the literature. A number of existing works provide empirical research on collaborative work practices (Lave & Wenger, 1987; Davenport, 2005), the sharing of information at work (Brown & Duguid, 2000), and the development of communities of practice in workplace settings (Wenger, 1998). Others examine the munificent variation of information and communication technology use in the work place, including studies of informal social networks, formal information distribution and other socio-technical combinations found in work settings (Gibson & Cohen, 2003). Another significant thread of prior work is focused on computer supported collaborative learning, much of it investigating the application of computer support for learning in the context of traditional educational institutions, like public schools, private schools, colleges and tutoring organizations. Exciting new theories of how knowledge is constructed by groups (Stahl, 2006), how teachers contribute to collaborative learning (reference to another book in the series) and the application of socio-technical scripts for learning is explicated in book length works on CSCL. Book length empirical work on CSCW is widespread, and CSCL book length works are beginning to emerge with greater frequency. We distinguish CSCL at Work from prior books written under the aegis of training and development, or human resources more broadly. The book aims to fill a void between existing works in CSCW and CSCL, and will open with a chapter characterizing the emerging application of collaborative learning theories and practices to workplace learning. CSCL and CSCW research each make distinct and important contributions to the construction of collaborative workplace learning.

Refine Search

Showing 11,176 through 11,200 of 53,836 results