Browse Results

Showing 28,351 through 28,375 of 61,748 results

Information Security: 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings (Lecture Notes in Computer Science #13640)

by Xiaofeng Chen Willy Susilo Fuchun Guo Rolly Intan Yudi Zhang

This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.

Information Security: 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings (Lecture Notes in Computer Science #14411)

by Elias Athanasopoulos Bart Mennink

This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023.The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.

Information Security: 27th International Conference, ISC 2024, Arlington, VA, USA, October 23–25, 2024, Proceedings, Part I (Lecture Notes in Computer Science #15257)

by Nicky Mouha Nick Nikiforakis

The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23–25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.

Information Security: 27th International Conference, ISC 2024, Arlington, VA, USA, October 23–25, 2024, Proceedings, Part II (Lecture Notes in Computer Science #15258)

by Nicky Mouha Nick Nikiforakis

The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23–25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.

Information Security: Design, Implementation, Measurement, and Compliance

by Timothy P. Layton

Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.

Information Security: Opportunities and Limitations

by Thomas Liedtke

This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their similarities and differences. The book presents currently used attack patterns and how to protect against them. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). How can one determine how secure data is? How can relevant threats be identified that need protection? How do risk analyses proceed?

Information Security: Principles and Practice

by Mark Stamp

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.

Information Security: Principles and Practice

by Mark Stamp

INFORMATION SECURITY Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout Information Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals alike. Author Mark Stamp provides clear, accessible, and accurate information on the four critical components of information security: cryptography, access control, network security, and software. Readers are provided with a wealth of real-world examples that clarify complex topics, highlight important security issues, and demonstrate effective methods and strategies for protecting the confidentiality and integrity of data. Fully revised and updated, the third edition of Information Security features a brand-new chapter on network security basics and expanded coverage of cross-site scripting (XSS) attacks, Stuxnet and other malware, the SSH protocol, secure software development, and security protocols. Fresh examples illustrate the Rivest-Shamir-Adleman (RSA) cryptosystem, elliptic-curve cryptography (ECC), SHA-3, and hash function applications including bitcoin and blockchains. Updated problem sets, figures, tables, and graphs help readers develop a working knowledge of classic cryptosystems, modern symmetric and public key cryptography, cryptanalysis, simple authentication protocols, intrusion and malware detection systems, quantum computing, and more. Presenting a highly practical approach to information security, this popular textbook: Provides up-to-date coverage of the rapidly evolving field of information security Explains session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, GSM, and other authentication protocols Addresses access control techniques including authentication and authorization, ACLs and capabilities, and multilevel security and compartments Discusses software security issues, ranging from malware detection to secure software development Includes an instructor’s solution manual, PowerPoint slides, lecture videos, and additional teaching resources Information Security: Principles and Practice, Third Edition is the perfect textbook for advanced undergraduate and graduate students in all Computer Science programs, and remains essential reading for professionals working in industrial or government security.

Information Services Design: A Design Science Approach for Sustainable Knowledge (Routledge Studies in Organization and Systems)

by Fons Wijnhoven

Information services are economic and organizational activities for informing people. Because informing is changing rapidly under the influence of internet-technologies, this book presents in Chapter 1 fundamental notions of information and knowledge, based on philosopher C.W. Churchman’s inquiring systems. This results in the identification of three product-oriented design theory aspects: content, use value and revenue. Chapter 2 describes how one can cope with these aspects by presenting process-oriented design theory. Both design theory insights are applied in chapters on information services challenges, their business concepts and processes, their architectures and exploitation. The final chapter discusses three case studies that integrate the insights from previous chapters, and it discusses some ideas for future research. This book gives students a coherent start to the topic of information services from a design science perspective, with a balance between technical and managerial aspects. Therefore, this book is useful for modern curricula of management, communication science and information systems. Because of its design science approach, it also explains design science principles. The book also serves professionals and academics in search of a foundational understanding of informing as a science and management practice.

Information Society Development through ICT Market Strategies

by Ermelinda Kordha Tolica Kozeta Sevrani Klodiana Gorica

​This book examines the relationship between information society and information communication technology (ICT) markets, while evaluating the ICT impact on Albanian society and its economy. It offers insights on the country's information society development and compares it to other nations. The book begins with a general introduction to information society and efforts that can be used for ICT strategy. It then takes a look at ICT as an industrial sector and uncovers the importance for a strong ICT infrastructure management. Using this background information, the book finally explores the growing information society and ICT sector found in Albania. It measures the information society being created, and compares it to other countries in South Eastern Europe. Next the authors introduce a theoretical model for ICT driven development, focusing on ICT innovation and investment as factors that can affect the ICT market. These factors have also taken into account for strategy development in the national and industry level. ​

Information Society and the Workplace: Spaces, Boundaries and Agency (Routledge Studies in Technology, Work and Organizations #Vol. 1)

by Jeff Hearn Tuula Heiskanen

Much has been written on the grand prospects for "Information Society"; much less on what this might mean in everyday terms. So what do we find when we look at what is happening in a society, Finland, that is one of closest to an information society? Bringing together studies of everyday local practices in workplaces within information society, this book has a special focus on social space and the agency of actors. It includes both theoretical reviews and detailed qualitative research. It also highlights the political challenges of the information society, challenges which are likely to become subjects of international concern.

Information Spread in a Social Media Age: Modeling and Control

by Michael Muhlmeyer Shaurya Agarwal

The rise of social networks and social media has led to a massive shift in the ways information is dispersed. Platforms like Twitter and Facebook allow people to more easily connect as a community, but they can also be avenues for misinformation, fake news, and polarization. The need to examine, model, and analyze the trajectory of information spread within this new paradigm has never been greater. This text expands upon the authors’ combined teaching experience, engineering knowledge, and multiple academic journal publications on these topics to present an intuitive and easy to understand exploration of social media information spread alongside the technical and mathematical concepts. By design, this book uses simple language and accessible and modern case studies (including those centered around United States mass shootings, the #MeToo social movement, and more) to ensure it is accessible to the casual reader. At the same time, readers with prior knowledge of the topics will benefit from the mathematical model and control elements and accompanying sample simulation code for each main topic. By reading this book and working through the included exercises, readers will gain a general understanding of modern social media systems, network fundamentals, model development techniques, and social marketing. The mathematical modeling of information spread over social media is heavily emphasized through a review of existing epidemiology and marketing based models. The book then presents novel models developed by the authors to account for modern social media concerns such as community filter bubbles, strongly polarized groups, and contentious information spread. Readers will learn how to build and execute simple case studies using Twitter data to help verify the text’s proposed models. Once the reader is armed with a fundamental understanding of mathematical modeling and social media-based system considerations, the book introduces more complex engineering control concepts, including controller design, PID control, and optimal control. Examples of control methods for social campaigns and misinformation mitigation applications are covered in a step-by-step format from problem formulation to solution simulation and results discussions. While many of the examples and methods are framed in the context of controlling social media information spread, the material is also directly applicable to many different types of controllable systems. With the essential background, models, and tools presented within, any interested reader can take the first steps toward exploring and taming the growing complexity of the modern social media age.

Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments

by Emc Education Services

The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the "Cloud" as well as updates and vital information on new technologies. Features a separate section on emerging area of cloud computing Covers new technologies such as: data de-duplication, unified storage, continuous data protection technology, virtual provisioning, FCoE, flash drives, storage tiering, big data, and more Details storage models such as Network Attached Storage (NAS), Storage Area Network (SAN), Object Based Storage along with virtualization at various infrastructure components Explores Business Continuity and Security in physical and virtualized environment Includes an enhanced Appendix for additional information This authoritative guide is essential for getting up to speed on the newest advances in information storage and management.

Information Storage: A Multidisciplinary Perspective

by Rolf Drechsler Cornelia S. Große

This book examines some of the underlying processes behind different forms of information management, including how we store information in our brains, the impact of new technologies such as computers and robots on our efficiency in storing information, and how information is stored in families and in society. The editors brought together experts from a variety of disciplines. While it is generally agreed that information reduces uncertainties and that the ability to store it safely is of vital importance, these authors are open to different meanings of “information”: computer science considers the bit as the information block; neuroscience emphasizes the importance of information as sensory inputs that are processed and transformed in the brain; theories in psychology focus more on individual learning and on the acquisition of knowledge; and finally sociology looks at how interpersonal processes within groups or society itself come to the fore. The book will be of value to researchers and students in the areas of information theory, artificial intelligence, and computational neuroscience.

Information Strategy Design and Practices

by Ranjan Prasad Singh Sanjay Mohapatra

Information Strategy Design and Practices develops a framework for designing information technology strategy for an organization. Beyond this, it establishes an approach to not only implement it, but sustain it. The framework explains how IT strategy should have an alignment to business to reap the benefits of business. The book contains five case studies in different domains: retail, real estate development, IT product development, development sector, and education sector. These case studies have been applied to different countries, providing a global prospective to this emerging trend.

Information System Audit: How to Control the Digital Disruption (Security, Audit and Leadership Series)

by Philippe Peret

The digitalization of companies is a recurrent topic of conversation for managers. Companies are forced to evolve at least as fast as their competitors. They have to review their organization, their processes, and their way of working. This also concerns auditors in terms of their audit strategy and working methods. Digitalization is the tip of the iceberg that represents the increasing reliance on information technology of the company’s information system. Companies have seen new competitors succeed with a digital approach, competitors that have opened new markets or new ways of interacting with their customers, and all business processes can be digitalized. In this new paradigm, auditors have to renew themselves too. Long gone are the days of auditors specializing in one technique, like financial auditors or IT auditors. This makes it a phenomenal opportunity for auditing to renew itself, embracing the vision of the company’s information system: long live the information system auditors! This book proposes you to go step by step from a common understanding of our history of auditing to gradually defining and justifying the impacts of digitalization on the audit strategy and the preparation of audits.

Information System Design Using Twiki

by Phillip Gochenour

Phil Gochenour combines real-world experience designing enterprise information systems with a veteran teacher's ability to explain the basic principles behind any system design, whether it's a cookbook or a software company's wiki. Information System Design Using TWiki takes the reader through a step-by-step project starting with the basic building block of all information systems, the topic, and continuing with sections on metadata, search systems, and usability. The companion website provides sample code that can be used to construct the complete project on the TWiki wiki platform, making it possible for readers to understand TWiki's functionality and potential while constructing a usable system. Whether you are looking for a way to learn the basics of information system design, or you work with TWiki and want to learn how to use it more effectively, this book is for you.

Information System Design: Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 2 (Lecture Notes in Networks and Systems #1057)

by Vikrant Bhateja Dilip Kumar Sharma Zdzislaw Polkowski Jinshan Tang Afaq Ahmad

This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3 - 4 January 2024. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security.

Information System Design: Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 4 (Lecture Notes in Networks and Systems #1107)

by Vikrant Bhateja Zdzislaw Polkowski Milan Simic V. V. S. S. S. Chakravarthy Jinshan Tang

This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3 - 4 January 2024. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security.

Information System Development: Improving Enterprise Communication

by Michael Lang Christoph Schneider Chris Barry Henry Linger María José Escalona Gustavo Aragón

Information System Development--Improving Enterprise Communication are the collected proceedings of the 22nd International Conference on Information Systems Development: Improving Enterprise Communication--ISD 2013 Conference, held in Seville, Spain. It follows in the tradition of previous conferences in the series in exploring the connections between industry, research and education. These proceedings represent ongoing reflections within the academic community on established information systems topics and emerging concepts, approaches and ideas. It is hoped that the papers herein contribute towards disseminating research and improving practice. The conference tracks highlighted at the 22nd International Conference on Information Systems Development (ISD 2013) were: Applications Data and Ontologies End Users Enterprise Evolution Industrial cases in ISD Intelligent Business Process Management Model Driven Engineering in ISD New Technologies Process Management Quality

Information Systems Analysis and Design (2nd Edition): Systems Acquisition Approach

by Wang Shouhong Wang

Information Systems Analysis and Design presents essential knowledge about management information systems development. It is used for four-year university and college students who study information systems analysis and design. Students will lea

Information Systems Architecture and Technology: Part I (Advances in Intelligent Systems and Computing #1050)

by Jerzy Świątek Leszek Borzemski Zofia Wilimowska

This three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem. Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems. This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wrocław, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections: Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing. Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling. Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.

Information Systems Architecture and Technology: Part II (Advances in Intelligent Systems and Computing #1051)

by Jerzy Świątek Leszek Borzemski Zofia Wilimowska

This three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem.Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems.This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wrocław, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections:Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing.Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling.Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.

Information Systems Architecture and Technology: Part III (Advances in Intelligent Systems and Computing #1052)

by Jerzy Świątek Leszek Borzemski Zofia Wilimowska

This three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem.Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems.This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wrocław, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections:Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing.Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling.Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.

Information Systems Architecture and Technology: Part Iii (Advances In Intelligent Systems and Computing #854)

by Jerzy Świątek Leszek Borzemski Zofia Wilimowska

This three-volume set of books highlights major advances in the development of concepts and techniques in the area of new technologies and architectures of contemporary information systems. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from the data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation and implementation of the solution to the real-life problem. Managing an organisation, especially in today’s rapidly changing circumstances, is a very complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest advances in science. This situation has prompted many decision-making bodies to introduce computer modelling of organisation management systems. The three books present the peer-reviewed proceedings of the 39th International Conference “Information Systems Architecture and Technology” (ISAT), held on September 16–18, 2018 in Nysa, Poland. The conference was organised by the Computer Science and Management Systems Departments, Faculty of Computer Science and Management, Wroclaw University of Technology and Sciences and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major parts: Part I—discusses topics including but not limited to Artificial Intelligence Methods, Knowledge Discovery and Data Mining, Big Data, Knowledge Based Management, Internet of Things, Cloud Computing and High Performance Computing, Distributed Computer Systems, Content Delivery Networks, and Service Oriented Computing. Part II—addresses topics including but not limited to System Modelling for Control, Recognition and Decision Support, Mathematical Modelling in Computer System Design, Service Oriented Systems and Cloud Computing, and Complex Process Modelling. Part III—focuses on topics including but not limited to Knowledge Based Management, Modelling of Financial and Investment Decisions, Modelling of Managerial Decisions, Production Systems Management and Maintenance, Risk Management, Small Business Management, and Theories and Models of Innovation.

Refine Search

Showing 28,351 through 28,375 of 61,748 results