Browse Results

Showing 25,551 through 25,575 of 53,908 results

Information Security Practice and Experience

by Feng Bao Liqun Chen Robert H. Deng Guojun Wang

This book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in Sydney, Australia, in May 2008. The papers cover a wide range of topics.

Information Security Practice and Experience: 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings (Lecture Notes in Computer Science #11879)

by Swee-Huay Heng Javier Lopez

This book constitutes the refereed proceedings of the 15th International Conference on Information Security Practice and Experience, ISPEC 2019, held in Kuala Lumpur, Malaysia, in November 2019. The 21 full and 7 short papers presented in this volume were carefully reviewed and selected from 68 submissions. They were organized into the following topical sections: Cryptography I, System and Network Security, Security Protocol and Tool, Access Control and Authentication, Cryptography II, Data and User Privacy, Short Paper I, and Short Paper II.

Information Security Practice and Experience: 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings (Lecture Notes in Computer Science #14341)

by Weizhi Meng Zheng Yan Vincenzo Piuri

This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023.The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.

Information Security Practice and Experience: 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings (Lecture Notes in Computer Science #13620)

by Vincenzo Piuri Chunhua Su Dimitris Gritzalis

This book constitutes the refereed proceedings of the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022. The 33 full papers together with 2 invited papers included in this volume were carefully reviewed and selected from 87 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.

Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17–19, 2021, Proceedings (Lecture Notes in Computer Science #13107)

by Mark Ryan Ding Wang Feng Bao Robert Deng Weizhi Meng Jian Shen Guilin Wang

This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021. The 23 full papers presented in this volume were carefully reviewed and selected from 94 submissions. The conference focus on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.

Information Security Practice and Experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings (Lecture Notes in Computer Science #11125)

by Chunhua Su Hiroaki Kikuchi

This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.

Information Security Practices

by Isaac Woungang Ahmed Awad Issa Traoré

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.

Information Security, Privacy and Digital Forensics: Select Proceedings of the International Conference, ICISPD 2022 (Lecture Notes in Electrical Engineering #1075)

by Sankita J. Patel Naveen Kumar Chaudhary Bhavesh N. Gohil S. S. Iyengar

This volume comprises the select proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2022). The content discusses novel contributions and latest developments in cyber-attacks and defenses, computer forensics and cybersecurity database forensics, cyber threat intelligence, data analytics for security, anonymity, penetration testing, incident response, Internet of Things security, malware and botnets, social media security, humanitarian forensics, software and media piracy, crime analysis, hardware security, among others. This volume will be a useful guide for researchers across industry and academia working in the field of security, privacy, and digital forensics from both technological and social perspectives.

Information Security Risk Management for ISO27001 / ISO27002

by Alan Calder Steve G Watkins

The changing global economy, together with recent corporate and IT governance developments, all provide the context within which organisations have to assess risks to the information assets on which their organisations, and the delivery of their business plan objectives, depend. Information security management decisions are entirely driven by specific decisions made as an outcome of a risk assessment process in relation to identified risks and specific information assets. Risk assessment is, therefore, the core competence of information security management.

Information Security Technologies for Controlling Pandemics (Advanced Sciences and Technologies for Security Applications)

by Hamid Jahankhani Stefan Kendzierskyj Babak Akhgar

The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lockdown. Though the positive outcomes of using these technologies are clear, doing so also comes with its fair share of potential issues, including risks regarding data and its use, such as privacy, transparency, exploitation and ownership. COVID-19 also led to a certain amount of paranoia, and the widespread uncertainty and fear of change represented a golden opportunity for threat actors. This book discusses and explains innovative technologies such as blockchain and methods to defend from Advanced Persistent Threats (APTs), some of the key legal and ethical data challenges to data privacy and security presented by the COVID-19 pandemic, and their potential consequences. It then turns to improved decision making in cyber security, also known as cyber situational awareness, by analysing security events and comparing data mining techniques, specifically classification techniques, when applied to cyber security data. In addition, the book illustrates the importance of cyber security, particularly information integrity and surveillance, in dealing with an on-going, infectious crisis. Aspects addressed range from the spread of misinformation, which can lead people to actively work against measures designed to ensure public safety and minimise the spread of the virus, to concerns over the approaches taken to monitor, track, trace and isolate infectious cases through the use of technology. In closing, the book considers the legal, social and ethical cyber and information security implications of the pandemic and responses to it from the perspectives of confidentiality, integrity and availability.

Information Security Technologies in the Decentralized Distributed Networks (Lecture Notes on Data Engineering and Communications Technologies #115)

by Roman Oliynykov Oleksandr Kuznetsov Oleksandr Lemeshko Tamara Radivilova

The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.

Information Security Theory and Practice: 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11469)

by Olivier Blazy Chan Yeob Yeun

This volume constitutes the refereed proceedings of the 12th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2018, held in Brussels, Belgium, in December 2018. The 13 revised full papers and 2 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: real world; cryptography; artificial learning; cybersecurity; and Internet of things.

Information Security Theory and Practice

by Sara Foresti Javier Lopez

This volume constitutes the refereed proceedings of the 10th IFIP WG 11. 2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions. WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.

Information Security Theory and Practice: 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedings (Lecture Notes in Computer Science #10741)

by Gerhard P. Hancke Ernesto Damiani

This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.

Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (Lecture Notes in Computer Science #12024)

by Maryline Laurent Thanassis Giannetsos

This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.

Information Services Design: A Design Science Approach for Sustainable Knowledge (Routledge Studies in Organization and Systems)

by Fons Wijnhoven

Information services are economic and organizational activities for informing people. Because informing is changing rapidly under the influence of internet-technologies, this book presents in Chapter 1 fundamental notions of information and knowledge, based on philosopher C.W. Churchman’s inquiring systems. This results in the identification of three product-oriented design theory aspects: content, use value and revenue. Chapter 2 describes how one can cope with these aspects by presenting process-oriented design theory. Both design theory insights are applied in chapters on information services challenges, their business concepts and processes, their architectures and exploitation. The final chapter discusses three case studies that integrate the insights from previous chapters, and it discusses some ideas for future research. This book gives students a coherent start to the topic of information services from a design science perspective, with a balance between technical and managerial aspects. Therefore, this book is useful for modern curricula of management, communication science and information systems. Because of its design science approach, it also explains design science principles. The book also serves professionals and academics in search of a foundational understanding of informing as a science and management practice.

Information Society and the Workplace: Spaces, Boundaries and Agency (Routledge Studies in Technology, Work and Organizations #Vol. 1)

by Jeff Hearn Tuula Heiskanen

Much has been written on the grand prospects for "Information Society"; much less on what this might mean in everyday terms. So what do we find when we look at what is happening in a society, Finland, that is one of closest to an information society? Bringing together studies of everyday local practices in workplaces within information society, this book has a special focus on social space and the agency of actors. It includes both theoretical reviews and detailed qualitative research. It also highlights the political challenges of the information society, challenges which are likely to become subjects of international concern.

Information Society Development through ICT Market Strategies

by Ermelinda Kordha Tolica Kozeta Sevrani Klodiana Gorica

​This book examines the relationship between information society and information communication technology (ICT) markets, while evaluating the ICT impact on Albanian society and its economy. It offers insights on the country's information society development and compares it to other nations. The book begins with a general introduction to information society and efforts that can be used for ICT strategy. It then takes a look at ICT as an industrial sector and uncovers the importance for a strong ICT infrastructure management. Using this background information, the book finally explores the growing information society and ICT sector found in Albania. It measures the information society being created, and compares it to other countries in South Eastern Europe. Next the authors introduce a theoretical model for ICT driven development, focusing on ICT innovation and investment as factors that can affect the ICT market. These factors have also taken into account for strategy development in the national and industry level. ​

Information Spread in a Social Media Age: Modeling and Control

by Michael Muhlmeyer Shaurya Agarwal

The rise of social networks and social media has led to a massive shift in the ways information is dispersed. Platforms like Twitter and Facebook allow people to more easily connect as a community, but they can also be avenues for misinformation, fake news, and polarization. The need to examine, model, and analyze the trajectory of information spread within this new paradigm has never been greater. This text expands upon the authors’ combined teaching experience, engineering knowledge, and multiple academic journal publications on these topics to present an intuitive and easy to understand exploration of social media information spread alongside the technical and mathematical concepts. By design, this book uses simple language and accessible and modern case studies (including those centered around United States mass shootings, the #MeToo social movement, and more) to ensure it is accessible to the casual reader. At the same time, readers with prior knowledge of the topics will benefit from the mathematical model and control elements and accompanying sample simulation code for each main topic. By reading this book and working through the included exercises, readers will gain a general understanding of modern social media systems, network fundamentals, model development techniques, and social marketing. The mathematical modeling of information spread over social media is heavily emphasized through a review of existing epidemiology and marketing based models. The book then presents novel models developed by the authors to account for modern social media concerns such as community filter bubbles, strongly polarized groups, and contentious information spread. Readers will learn how to build and execute simple case studies using Twitter data to help verify the text’s proposed models. Once the reader is armed with a fundamental understanding of mathematical modeling and social media-based system considerations, the book introduces more complex engineering control concepts, including controller design, PID control, and optimal control. Examples of control methods for social campaigns and misinformation mitigation applications are covered in a step-by-step format from problem formulation to solution simulation and results discussions. While many of the examples and methods are framed in the context of controlling social media information spread, the material is also directly applicable to many different types of controllable systems. With the essential background, models, and tools presented within, any interested reader can take the first steps toward exploring and taming the growing complexity of the modern social media age.

Information Storage: A Multidisciplinary Perspective

by Cornelia S. Große Rolf Drechsler

This book examines some of the underlying processes behind different forms of information management, including how we store information in our brains, the impact of new technologies such as computers and robots on our efficiency in storing information, and how information is stored in families and in society. The editors brought together experts from a variety of disciplines. While it is generally agreed that information reduces uncertainties and that the ability to store it safely is of vital importance, these authors are open to different meanings of “information”: computer science considers the bit as the information block; neuroscience emphasizes the importance of information as sensory inputs that are processed and transformed in the brain; theories in psychology focus more on individual learning and on the acquisition of knowledge; and finally sociology looks at how interpersonal processes within groups or society itself come to the fore. The book will be of value to researchers and students in the areas of information theory, artificial intelligence, and computational neuroscience.

Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments

by Emc Education Services

The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the "Cloud" as well as updates and vital information on new technologies. Features a separate section on emerging area of cloud computing Covers new technologies such as: data de-duplication, unified storage, continuous data protection technology, virtual provisioning, FCoE, flash drives, storage tiering, big data, and more Details storage models such as Network Attached Storage (NAS), Storage Area Network (SAN), Object Based Storage along with virtualization at various infrastructure components Explores Business Continuity and Security in physical and virtualized environment Includes an enhanced Appendix for additional information This authoritative guide is essential for getting up to speed on the newest advances in information storage and management.

Information Strategy Design and Practices

by Ranjan Prasad Singh Sanjay Mohapatra

Information Strategy Design and Practices develops a framework for designing information technology strategy for an organization. Beyond this, it establishes an approach to not only implement it, but sustain it. The framework explains how IT strategy should have an alignment to business to reap the benefits of business. The book contains five case studies in different domains: retail, real estate development, IT product development, development sector, and education sector. These case studies have been applied to different countries, providing a global prospective to this emerging trend.

Information System Audit: How to Control the Digital Disruption (Security, Audit and Leadership Series)

by Philippe Peret

The digitalization of companies is a recurrent topic of conversation for managers. Companies are forced to evolve at least as fast as their competitors. They have to review their organization, their processes, and their way of working. This also concerns auditors in terms of their audit strategy and working methods. Digitalization is the tip of the iceberg that represents the increasing reliance on information technology of the company’s information system. Companies have seen new competitors succeed with a digital approach, competitors that have opened new markets or new ways of interacting with their customers, and all business processes can be digitalized. In this new paradigm, auditors have to renew themselves too. Long gone are the days of auditors specializing in one technique, like financial auditors or IT auditors. This makes it a phenomenal opportunity for auditing to renew itself, embracing the vision of the company’s information system: long live the information system auditors! This book proposes you to go step by step from a common understanding of our history of auditing to gradually defining and justifying the impacts of digitalization on the audit strategy and the preparation of audits.

The Information System Consultant's Handbook: Systems Analysis and Design

by William S. Davis David C. Yen

The Information System Consultant's Handbook familiarizes systems analysts, systems designers, and information systems consultants with underlying principles, specific documentation, and methodologies.Corresponding to the primary stages in the systems development life cycle, the book divides into eight sections:PrinciplesInformation Gathering and Problem DefinitionProject Planning and Project ManagementSystems AnalysisIdentifying AlternativesComponent DesignTesting and ImplementationOperation and MaintenanceEighty-two chapters comprise the book, and each chapter covers a single tool, technique, set of principles, or methodology. The clear, concise narrative, supplemented with numerous illustrations and diagrams, makes the material accessible for readers - effectively outlining new and unfamiliar analysis and design topics.

Information System Design Using Twiki

by Phillip Gochenour

Phil Gochenour combines real-world experience designing enterprise information systems with a veteran teacher's ability to explain the basic principles behind any system design, whether it's a cookbook or a software company's wiki. Information System Design Using TWiki takes the reader through a step-by-step project starting with the basic building block of all information systems, the topic, and continuing with sections on metadata, search systems, and usability. The companion website provides sample code that can be used to construct the complete project on the TWiki wiki platform, making it possible for readers to understand TWiki's functionality and potential while constructing a usable system. Whether you are looking for a way to learn the basics of information system design, or you work with TWiki and want to learn how to use it more effectively, this book is for you.

Refine Search

Showing 25,551 through 25,575 of 53,908 results