ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Centers and Programs  (32)
  • Computer Science  (14)
  • Sustainable development  (6)
  • English  (52)
  • Italian
  • 2020-2024
  • 2015-2019
  • 2010-2014  (52)
  • 2000-2004
  • 1990-1994
  • 1965-1969
  • 1930-1934
  • 2014  (52)
  • 2003
Collection
Keywords
Language
  • English  (52)
  • Italian
Years
  • 2020-2024
  • 2015-2019
  • 2010-2014  (52)
  • 2000-2004
  • 1990-1994
  • +
Year
  • 1
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Earth sciences ; Physical geography ; Environmental management ; Sustainable development ; Earth Sciences ; Earth System Sciences ; Environmental Management ; Sustainable Development
    Description / Table of Contents: Managing Environmental Risks and Promoting Sustainability: Science Advancement and Leadership Development --- Biodiversity Agriculture Supports Human Populations --- Conservation and Sustainable Management of Soil Biodiversity for Agricultural Productivity --- Conservation Tillage Assessment For Mitigating Greenhouse Gas Emission In Rainfed Agro-Ecosystem --- Improving Biodiversity in Rice Paddy Fields to Promote Land Sustainability --- Agroforestry Models for Promoting Effective Risk Management and Building Sustainable Communities --- Managing Environmental Risks and Promoting Sustainability: Conservation of Forest Resources in Madagascar --- Community-Based Mangrove Forest Management in Thailand: Key Lesson Learned for Environmental Risk Management --- Necessity of Adaptive Risk Management for Fisheries and Wildlife --- Valuation of Non-Marketed Agricultural Ecosystem Services and Food Security in Southeast Asia --- Emerging Socio-Economic and Environmental Issues Affecting Food Security: A Case Study of Silang-Santa Rosa Subwatershed --- Strengthening the Capacity of Flood-Affected Rural Communities in Padang Terap, State of Kedah, Malaysia --- Mitigating Coastal Erosion in Fort Dauphin, Madagascar --- Risk Management of Chemical Pollution: Principles from the Japanese Experience --- Research on the Sod Between Chlorophyll-a and Organic Matter BOD, COD, Phosphorus and Total Nitrogen in Stagnant Lake Basins --- Managing Construction Development Risks to the Environment --- Ecosystem Restoration Using the Near-Natural Method in Shanghai --- Sustainable Management of Urban Green Environments: Challenges and Opportunities --- Environment and Social Capacity Assessment for Sustainability Promotion and Risk Management --- Rural Landscape Conservation in Japan: Lessons from the Satoyama Conservation Program in Kanagawa Prefecture --- Enhancing Students’ Ecological Thinking to Improve Understanding of Environmental Risk --- Interactive Multimedia Education System (IMES) as a International Education Platform
    Pages: Online-Ressource (XV, 286 pages) , 89 illustrations, 70 illustrations in color
    ISBN: 9784431548041
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Environment ; Agriculture ; Ecosystems ; Sustainable development ; Sociology ; Human geography ; Sex (Psychology) ; Gender expression ; Gender identity ; Environment ; Sustainable Development ; Agriculture ; Gender Studies ; Ecosystems ; Human Geography
    Description / Table of Contents: PART I: Ester Boserup’s Intellectual Heritage --- 1. Ester Boserup: An Interdisciplinary Visionary Relevant for Sustainability --- 2. “Finding Out Is My Life”: Conversations with Ester Boserup in the 1990s --- 3. Boserup’s Theory on Technological Change as a Point of Departure for the Theory of Sociometabolic Regime Transition --- PART II Land Use, Technology and Agriculture --- 4. The Dwindling Role of Population Pressure in Land Use Change – a Case from the South West Pacific --- 5. Conceptual and Empirical Approaches to Mapping and Quantifying Land-Use Intensity --- 6. Malthusian Assumptions, Boserupian Response in Transition to Agriculture Models --- 7. Reconciling Boserup with Malthus: Agrarian Change and Soil Degradation in Olive Orchards in Spain (1750-2000) --- 8. Beyond Boserup: The Role of Working Time in Agricultural Development --- PART III: Population and Gender --- 9. Following Boserup’s Traces: From Invisibility to Informalisation of Women’s Economy to Engendering Development in Translocal Spaces --- 10. Daughters of the Hills: Gendered Agricultural Production, Modernisation, and Declining Child Sex Ratios in the Indian Central Himalayas --- 11. Revisiting Boserup’s Hypotheses in the Context of Africa --- 12. An Interpretation of Large-Scale Land Deals Using Boserup’s Theories of Agricultural Intensification, Gender and Rural Development --- 13. Labour Migration and Gendered Agricultural Asset Shifts in Southeastern Mexico: Two Stories of Farming Wives and Daughters --- 14. Working Time of Farm Women and Small-Scale Sustainable Farming in Austria --- 15. A Human Ecological Approach to Ester Boserup: Steps Towards Engendering Agriculture and Rural Development --- 16. Conclusions: Re-Evaluating Boserup in the Light of the Contributions to this Volume
    Pages: Online-Ressource (XXV, 267 pages) , 44 illustrations, 22 illustrations in color
    ISBN: 9789401786782
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Environment ; Renewable energy resources ; Energy policy ; Energy and state ; Energy efficiency ; Climate change ; Renewable energy sources ; Alternate energy sources ; Green energy industries ; Environmental engineering ; Biotechnology ; Sustainable development ; Environment ; Sustainable Development ; Energy Policy, Economics and Management ; Energy Efficiency (incl. Buildings) ; Climate Change Management and Policy ; Renewable and Green Energy ; Environmental Engineering/Biotechnology
    Description / Table of Contents: 1 “Diffusive Demand” and “Creative Demand” --- 2 The 21st Century Paradigm and the Role of Information Technology --- 3 “Vision 2050” as the Rescue of a “Limited Earth” --- 4 Finding a Way Out Through Creative Demand, I --- 5 Finding a Way Out Through Creative Demand, II --- 6 Toward the Realization of a “Platinum Society”
    Pages: Online-Ressource (XXIX, 103 pages) , 30 illustrations, 29 illustrations in color
    ISBN: 9784431545590
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Environment ; Agriculture ; Ecosystems ; Sustainable development ; Sociology ; Human geography ; Sex (Psychology) ; Gender expression ; Gender identity ; Environment ; Sustainable Development ; Agriculture ; Gender Studies ; Ecosystems ; Human Geography
    Description / Table of Contents: PART I: Ester Boserup’s Intellectual Heritage --- 1. Ester Boserup: An Interdisciplinary Visionary Relevant for Sustainability --- 2. “Finding Out Is My Life”: Conversations with Ester Boserup in the 1990s --- 3. Boserup’s Theory on Technological Change as a Point of Departure for the Theory of Sociometabolic Regime Transition --- PART II Land Use, Technology and Agriculture --- 4. The Dwindling Role of Population Pressure in Land Use Change – a Case from the South West Pacific --- 5. Conceptual and Empirical Approaches to Mapping and Quantifying Land-Use Intensity --- 6. Malthusian Assumptions, Boserupian Response in Transition to Agriculture Models --- 7. Reconciling Boserup with Malthus: Agrarian Change and Soil Degradation in Olive Orchards in Spain (1750-2000) --- 8. Beyond Boserup: The Role of Working Time in Agricultural Development --- PART III: Population and Gender --- 9. Following Boserup’s Traces: From Invisibility to Informalisation of Women’s Economy to Engendering Development in Translocal Spaces --- 10. Daughters of the Hills: Gendered Agricultural Production, Modernisation, and Declining Child Sex Ratios in the Indian Central Himalayas --- 11. Revisiting Boserup’s Hypotheses in the Context of Africa --- 12. An Interpretation of Large-Scale Land Deals Using Boserup’s Theories of Agricultural Intensification, Gender and Rural Development --- 13. Labour Migration and Gendered Agricultural Asset Shifts in Southeastern Mexico: Two Stories of Farming Wives and Daughters --- 14. Working Time of Farm Women and Small-Scale Sustainable Farming in Austria --- 15. A Human Ecological Approach to Ester Boserup: Steps Towards Engendering Agriculture and Rural Development --- 16. Conclusions: Re-Evaluating Boserup in the Light of the Contributions to this Volume
    Pages: Online-Ressource (XXV, 267 pages) , 44 illustrations, 22 illustrations in color
    ISBN: 9789401786782
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team’s findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. His personal blog about programming is BytesThink (www.bytesthink.com)
    Pages: Online-Ressource (XXII, 680 pages) , 256 illustrations
    ISBN: 9781430268383
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine. It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work
    Pages: Online-Ressource (XX, 272 pages) , 74 illustrations
    ISBN: 9781430265726
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...