Browse Results

Showing 25,301 through 25,325 of 53,620 results

The Information Revolution in Asia

by Lily Wu Nina Hachigian

This report discusses the information revolution in the Asia-Pacific region and its likely course over the next five to ten years. Key questions addressed in this report include the extent to which the information revolution has taken hold of markets in this region, the political implications of the information revolution for Asian governments, the variations between individual countries, and the prospects for further information-technology-related developments in the region.

Information Risk and Security: Preventing and Investigating Workplace Computer Crime

by Edward Wilding

Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged. There is advice on: ¢ preventing computer fraud, IP theft and systems sabotage ¢ adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse ¢ securing information - in both electronic and hard copy form ¢ understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes ¢ dealing with catastrophic risk ¢ best-practice for monitoring and securing office and wireless networks ¢ responding to attempted extortion and malicious information leaks ¢ conducting covert operations and forensic investigations ¢ securing evidence where computer misuse occurs and presenting this evidence in court and much more. The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems.

Information Science

by David G. Luenberger

From cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains the most important concepts and insights at the core of this ongoing revolution. The book represents the material used in a widely acclaimed course offered at Stanford University. Drawing concepts from each of the constituent subfields that collectively comprise information science, Luenberger builds his book around the five "E's" of information: Entropy, Economics, Encryption, Extraction, and Emission. Each area directly impacts modern information products, services, and technology--everything from word processors to digital cash, database systems to decision making, marketing strategy to spread spectrum communication. To study these principles is to learn how English text, music, and pictures can be compressed, how it is possible to construct a digital signature that cannot simply be copied, how beautiful photographs can be sent from distant planets with a tiny battery, how communication networks expand, and how producers of information products can make a profit under difficult market conditions. The book contains vivid examples, illustrations, exercises, and points of historic interest, all of which bring to life the analytic methods presented: Presents a unified approach to the field of information science Emphasizes basic principles Includes a wide range of examples and applications Helps students develop important new skills Suggests exercises with solutions in an instructor's manual

Information Science and Applications: Proceedings of ICISA 2020 (Lecture Notes in Electrical Engineering #739)

by Hyuncheol Kim Kuinam J. Kim Suhyun Park

This book presents select proceedings of 11th International Conference on Information Science and Applications 2020 (ICISA 2020) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. Also the proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this book, readers can gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.

Information Science and Applications: ICISA 2019 (Lecture Notes in Electrical Engineering #621)

by Kuinam J. Kim Hye-Young Kim

This book presents selected papers from the 10th International Conference on Information Science and Applications (ICISA 2019), held on December 16–18, 2019, in Seoul, Korea, and provides a snapshot of the latest issues regarding technical convergence and convergences of security technologies. It explores how information science is at the core of most current research as well as industrial and commercial activities. The respective chapters cover a broad range of topics, including ubiquitous computing, networks and information systems, multimedia and visualization, middleware and operating systems, security and privacy, data mining and artificial intelligence, software engineering and web technology, as well as applications and problems related to technology convergence, which are reviewed and illustrated with the aid of case studies. Researchers in academia, industry, and at institutes focusing on information science and technology will gain a deeper understanding of the current state of the art in information strategies and technologies for convergence security. ​

Information Science and Applications 2018: ICISA 2018 (Lecture Notes in Electrical Engineering #514)

by Kuinam J. Kim Nakhoon Baek

This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readership includes researchers in academia, industry and other research institutes focusing on information science and technology.

Information Sciences and Systems 2013

by Erol Gelenbe Ricardo Lent

Based on a rigorous selection from 58 proposals coming from across the world, this volume will include some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. The book will offer the reader with a timely access to innovative research from many different areas of the world where advances in computing and communications are created.

Information Sciences and Systems 2014

by Tadeusz Czachórski Erol Gelenbe Ricardo Lent

Based on a rigorous selection of submissions to The 29th International Symposium on Computer and Information Sciences (ISCIS 2014), this books includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. It offers the reader a timely access to innovative research and advances in computing and communications from many different areas of the world. The topics covered include (but are not limited to) computer architectures and digital systems, algorithms, theory, software engineering, data engineering, computational intelligence, system security, computer systems and networks, performance modeling and analysis, distributed and parallel systems, bioinformatics, computer vision and significant applications such as medical informatics and imaging. The 29th International Symposium on Computer and Information Sciences (ISCIS 2014) took place in Krakow Old City, Poland on October, 27-8, 2014.

Information Sciences and Systems 2015

by Omer H. Abdelrahman Erol Gelenbe Gokce Gorbil Ricardo Lent

The 30th Anniversary of the ISCIS (International Symposium on Computer and Information Sciences) series of conferences, started by Professor Erol Gelenbe at Bilkent University, Turkey, in 1986, will be held at Imperial College London on September 22-24, 2015. The preceding two ISCIS conferences were held in Krakow, Poland in 2014, and in Paris, France, in 2013. The Proceedings of ISCIS 2015 published by Springer brings together rigorously reviewed contributions from leading international experts. It explores new areas of research and technological development in computer science, computer engineering, and information technology, and presents new applications in fast changing fields such as information science, computer science and bioinformatics. The topics covered include (but are not limited to) advances in networking technologies, software defined networks, distributed systems and the cloud, security in the Internet of Things, sensor systems, and machine learning and large data sets.

Information Search, Integration, and Personalization

by Emanuel Grant Dimitris Kotzinos Dominique Laurent Nicolas Spyratos Yuzuru Tanaka

This book constitutes the refereed post-proceedings of the 7th International Workshop on Information Search, Integration and Personalization, ISIP 2012, held in Sapporo, Japan, in October 2012. The 14 revised full papers presented were carefully reviewed and selected from 29 presentations. The papers are organized in topical sections on knowledge federation and integration; social system support and visualization; social information search and discovery.

Information Search, Integration, and Personalization

by Asanee Kawtrakul Dominique Laurent Nicolas Spyratos Yuzuru Tanaka

This book constitutes the refereed post-proceedings of the International Workshop on Information Search, Integration and Personalization, ISIP 2013, held in Bangkok, Thailand, in September 2013. The 10 revised full papers presented were carefully reviewed and selected from 28 presentations. The papers are organized in topical sections on knowledge federation and integration; information discovery; recommendation systems and ontologies.

Information Search, Integration and Personalization

by Dimitrios Kotzinos Yeow Wei Choong Nicolas Spyratos Yuzuru Tanaka

This book constitutes the refereed post-proceedings of the 9th International Workshop on Information Search, Integration and Personalization, ISIP 2014, held in Kuala Lumpur, Malaysia, in October 2014. The 6 revised full papers and one invited papers presented were carefully reviewed and selected from 19 presentations. The papers are organized around the following topics: information search in large data sets (databases, digital libraries, data warehouses); comparison of different information search technologies, approaches, and algorithms; novel approaches to information search; personalized information retrieval and personalized web search; data analytics (data mining, data warehousing); integration of Web-services, knowledge bases, digital libraries; federation of smart objects.

Information Search, Integration, and Personalization: 12th International Workshop, ISIP 2018, Fukuoka, Japan, May 14–15, 2018, Revised Selected Papers (Communications in Computer and Information Science #1040)

by Dimitris Kotzinos Dominique Laurent Nicolas Spyratos Yuzuru Tanaka Rin-Ichiro Taniguchi

This book constitutes the revised selected papers of the 12th International Workshop on Information Search, Integration and Personalization, ISIP 2018, held in Fukuoka, Japan, in May 2018.The volume presents 1 invited paper as well as 7 revised full papers, which were carefully reviewed and selected from 13 papers submitted to these post-conference proceedings. The papers are organized in topical sections on data integration; text and document management; advanced data mining techniques.

Information Search, Integration, and Personalization: 13th International Workshop, ISIP 2019, Heraklion, Greece, May 9–10, 2019, Revised Selected Papers (Communications in Computer and Information Science #1197)

by Nicolas Spyratos Yuzuru Tanaka Dominique Laurent Dimitris Plexousakis Giorgos Flouris

This book constitutes the revised selected papers of the 13th International Workshop on Information Search, Integration and Personalization, ISIP 2019, held in Heraklion, Greece, in May 2019.The volume presents 11 revised full papers, which were carefully reviewed and selected from 16 papers submitted to these post-conference proceedings. The papers are organized in topical sections on linked data; data analytics; data integration; data mining applications.

Information Search, Integration, and Personlization: 11th International Workshop, ISIP 2016, Lyon, France, November 1–4, 2016, Revised Selected Papers (Communications in Computer and Information Science #760)

by Yuzuru Tanaka Nicolas Spyratos Jean-Marc Petit Dominique Laurent Dimitris Kotzinos

This book constitutes the revised selected papers of the 11th International Workshop on Information Search, Integration and Personalization, ISIP 2016, held in Lyon, France, in November 2016. The 8 revised full papers presented were carefully reviewed and selected from 13 papers submitted to these post-conference proceedings from 30 conference presentations. The papers are organized in topical sections on exploratory analysis, mobility data analysis, and management of large data graphs.

Information Security: 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings (Lecture Notes in Computer Science #14411)

by Elias Athanasopoulos Bart Mennink

This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023.The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.

Information Security

by Matt Bishop Anderson C A Nascimento

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I'll need a copy. " Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies. Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.

Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings (Lecture Notes in Computer Science #11060)

by Liqun Chen Mark Manulis Steve Schneider

This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.

Information Security

by Yvo Desmedt

This book constitutes the thoroughly refereedpost-conference proceedings of the 16th International Conference on InformationSecurity, ISC 2013, held in Dallas, Texas, in November 2013. The 16 revised full papers presented together with 14short papers were carefully reviewed and selected from 70 submissions. Thepapers cover a wide range of topics in the area of cryptography andcryptanalysis and are organized in the following topical sections: security ofoperating systems; secret sharing; encryption; malware and Criticalinfrastructures; cryptanalysis; block ciphers and stream ciphers; entityauthentication; usability & risk perception; access control; computersecurity; privacy attacks; cryptography.

Information Security: 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings (Lecture Notes in Computer Science #11723)

by Zhiqiang Lin Charalampos Papamanthou Michalis Polychronakis

This book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. The papers were organized in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; Crypto II: Zero-Knowledge Proofs; Defenses; Web Security; Side Channels; Malware Analysis; Crypto III: Signatures and Authentication.

Information Security: 24th International Conference, ISC 2021, Virtual Event, November 10–12, 2021, Proceedings (Lecture Notes in Computer Science #13118)

by Joseph K. Liu Sokratis Katsikas Weizhi Meng Willy Susilo Rolly Intan

This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security.

Information Security

by Javier Lopez Chris J. Mitchell

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.

Information Security: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (Lecture Notes in Computer Science #10599)

by Phong Q. Nguyen and Jianying Zhou

This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.

Information Security: Principles and Practice

by Mark Stamp

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.

Information Security: Principles and Practice

by Mark Stamp

INFORMATION SECURITY Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout Information Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals alike. Author Mark Stamp provides clear, accessible, and accurate information on the four critical components of information security: cryptography, access control, network security, and software. Readers are provided with a wealth of real-world examples that clarify complex topics, highlight important security issues, and demonstrate effective methods and strategies for protecting the confidentiality and integrity of data. Fully revised and updated, the third edition of Information Security features a brand-new chapter on network security basics and expanded coverage of cross-site scripting (XSS) attacks, Stuxnet and other malware, the SSH protocol, secure software development, and security protocols. Fresh examples illustrate the Rivest-Shamir-Adleman (RSA) cryptosystem, elliptic-curve cryptography (ECC), SHA-3, and hash function applications including bitcoin and blockchains. Updated problem sets, figures, tables, and graphs help readers develop a working knowledge of classic cryptosystems, modern symmetric and public key cryptography, cryptanalysis, simple authentication protocols, intrusion and malware detection systems, quantum computing, and more. Presenting a highly practical approach to information security, this popular textbook: Provides up-to-date coverage of the rapidly evolving field of information security Explains session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, GSM, and other authentication protocols Addresses access control techniques including authentication and authorization, ACLs and capabilities, and multilevel security and compartments Discusses software security issues, ranging from malware detection to secure software development Includes an instructor’s solution manual, PowerPoint slides, lecture videos, and additional teaching resources Information Security: Principles and Practice, Third Edition is the perfect textbook for advanced undergraduate and graduate students in all Computer Science programs, and remains essential reading for professionals working in industrial or government security.

Refine Search

Showing 25,301 through 25,325 of 53,620 results