ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (70)
  • Computer Science  (41)
  • seismology  (29)
  • 2010-2014  (57)
  • 1995-1999  (11)
  • 1985-1989  (2)
  • 1
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Computer science ; Computational linguistics ; Computer Science ; Language Translation and Linguistics ; Computational Linguistics
    Description / Table of Contents: Key Messages --- Executive Summary --- 1.Introduction --- 2.Multilingual Europe: Facts, Challenges, Opportunities --- 3.Major Trends in Information and Communication Technologies --- 4.Language Technology 2012: Current State and Opportunities --- 5.Language Technology 2020: The META-NET Technology Vision --- 6.Language Technology 2020: Priority Research Themes --- 7.Towards a Shared European Programme for Multilingual Europe 2020: Next Steps --- A.References --- B.List of Key Contributors --- C.Milestones and History of the Strategic Research Agenda --- D.About META-NET --- E.Members of META-NET --- F.Abbreviations and Acroynms
    Pages: Online-Ressource (VIII, 87 pages) , 22 illustrations in color
    ISBN: 9783642363498
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer science ; Production management ; Management information systems ; Special purpose computers ; Software engineering ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business IT Infrastructure ; Computer Appl. in Administrative Data Processing ; Operations Management ; Software Engineering ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Introduction to the Internet of Things --- The Need for a Common Ground for the IoT — The History and Reasoning Behind the IoT — A Project --- The IoT Architectural Reference Model as Enabler --- IoT in Practice: Examples — IoT in Logistics and Health --- IoT — A Guidance to the ARM --- A Process to Generate Concrete Architectures --- IoT Reference Model --- IoT Reference Architecture --- The IoT ARM Reference Manual --- Interactions --- Toward a Concrete Architecture --- ARM Testimonials --- Summary and Outlook
    Pages: Online-Ressource (X, 349 pages) , 131 illustrations, 116 illustrations in color
    ISBN: 9783642404030
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computer science ; Computer communication systems ; Data mining ; User interfaces (Computer systems) ; Artificial intelligence ; Pattern recognition ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Pattern Recognition ; Computer Communication Networks
    Description / Table of Contents: Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied originates from one domain.   The focus of this book, and the BISON project from which the contributions originate, is a network-based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of seeking well-defined global or local patterns, the aim was to find domain-bridging associations. These are particularly interesting if they are sparse and have not been encountered before.   The 32 contributions presented in this state-of-the-art survey, together with a detailed introduction to the book, are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.  
    Pages: Online-Ressource (X, 486 pages) , 146 illustrations
    ISBN: 9783642318306
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Computer science ; Computer communication systems ; Computers and civilization ; Management information systems ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Communications Engineering, Networks ; Computers and Society ; Management of Computing and Information Systems
    Description / Table of Contents: This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics.   Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed:   - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    Pages: Online-Ressource (IX, 243 pages) , 61 illustrations
    ISBN: 9783642303821
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Computer science ; Computer communication systems ; Data mining ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Data Mining and Knowledge Discovery ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must. The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures
    Pages: Online-Ressource (XXV, 252 pages)
    ISBN: 9783642302411
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Information Storage and Retrieval ; Multimedia Information Systems ; Communications Engineering, Networks ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will be a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.  This book is published in full compliance with the Open Access publishing initiative; it is based on the research carried out within the Future Internet Assembly (FIA). It contains a sample of representative results from the recent FIA meetings spanning a broad range of topics, all being of crucial importance for the future Internet.  The book includes 32 contributions and has been structured into the following sections, each of which is preceded by a short introduction: Foundations: architectural issues; socio-economic issues; security and trust; and experiments and experimental design. Future Internet Areas: networks, services, and content; and applications
    Pages: Online-Ressource (XVI, 465 pages)
    ISBN: 9783642208980
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Information Storage and Retrieval ; Computers and Society
    Description / Table of Contents: Software Driven Networks, Virtualisation, Programmability and Autonomic Management --- Towards a Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet (SmartenIT) --- The NEBULA Future Internet Architecture --- Open the Way to Future Networks – A Viewpoint Framework from ITU-T --- Towards a Minimal Core for Information-Centric Networking --- Managing QoS for Future Internet Applications over Virtual Sensor Networks --- High Availability in the Future Internet --- Integrating OpenFlow in IMS Networks and Enabling for Future Internet Research and Experimentation --- Computing and Networking Clouds Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds --- Cloud–Based Evaluation Framework for Big Data --- Optimizing Service Ecosystems in the Cloud --- Resource Optimisation in IoT Cloud Systems by Using Matchmaking and Self-management Principles --- Towards a Secure Network Virtualization Architecture for the Future Internet --- Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures --- Internet of Things --- IoT6 – Moving to an IPv6-Based Future IoT --- SmartSantander: Internet of Things Research and Innovation through Citizen Participation --- A Cognitive Management Framework for Empowering the Internet of Things --- Building Modular Middlewares for the Internet of Things with OSGi --- Towards an Architecture for Future Internet Applications --- ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability --- Test-Enabled Architecture for IoT Service Creation and Provisioning --- Enabling Technologies and Economic Incentives Sustainable Wireless Broadband Access to the Future Internet --- The EARTH Project --- An Internet-Based Architecture Supporting Ubiquitous Application User Interfaces --- Cooperative Strategies for Power Saving in Multi-standard Wireless Devices --- Counting the Cost of FIRE: Overcoming Barriers to Sustainable Experimentation Facilities --- User Involvement in Future Internet Projects --- Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play --- Book Sponsoring Projects Overview 3DLife - Bringing the Media Internet to Life --- CONCORD Project Management of the Future Internet --- FLAMINGO NoE Project Management of the Future Internet --- The GEYSERS Concept and Major Outcomes --- iCore: A Cognitive Management Framework for the Internet of Things --- IoT6 Project in a Nutshell --- Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand --- The SmartenIT STREP Project: Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet --- The SmartSantander Project --- UniverSelf, Realizing Autonomics for Future Networks
    Pages: Online-Ressource (XLIV, 369 pages) , 131 illustrations
    ISBN: 9783642380822
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Computer science ; Management information systems ; Industrial management ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business Process Management ; Computer Appl. in Administrative Data Processing ; Management of Computing and Information Systems
    Description / Table of Contents: Introduction --- The Problem - Part I --- The Solution --- Transition --- The Problem - Part II --- The Solution - Part II --- Transition - Part II --- The Problem - Part III --- The Solution - Part III --- Transition - Part III --- The Problem, The Solution and The End - Final Part --- Troubleshooting
    Pages: Online-Ressource (X, 143 pages) , 210 illustrations in color
    ISBN: 9783642369049
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: geology ; geophysics ; seismology ; seismotectonics
    Description / Table of Contents: A workshop on Induced Seismicity was organized during the 27th General Assembly of the International Association of Seismology and Physics of Earth's Interior (IASPEI) in Wellington, New Zealand during January 10-21, 1994. This volume presents a collection of 16 papers accepted for publication which accrued from this workshop. The first three papers address mining activity related to induced seismicity. The fourth paper deals with water injection induced seismic activity, while the remaining 12 papers treat several aspects of water reservoir induced earthquakes. Globally, the Koyna dam creating Shivajisagar Lake in Maharashtra, India, continues to be the most significant site of reservoir-induced earthquakes. With the increase in the number of cases of induced seismicity, there is a growing concern among planners, engineers, geophysicists and geologists to understand the environment conducive to this phenomenon. While the changes in pore-fluid pressure have been identified as the key factor in inducing earthquakes, the phenomenon itself is still poorly understood. This reality thus makes the study of the induced seismicity very important and this volume timely.
    Pages: Online-Ressource (VI, 217 Seiten)
    ISBN: 9783764352370
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: geodynamics ; geophysics ; seismology
    Description / Table of Contents: Geodynamics concerns the dynamics of the earth's global motion, of the earth's interior motion and its interaction with surface features, together with the mechanical processes in the deformation and rupture of geological structures. Its final object is to determine the driving mechanism of these motions. It is highly interdisciplinary. In providing the basic geological, geophysical infromation required for a comprehensive mechanical analysis, there are also many mechanical problems involved, which means the problem is coupled intricately with geophysics, rock mechanics, seismology, structural geology, etc. This is Part II of the Proceedings of an IUTAM/IASPEI Symposium on Mechanics Problems in Geodynamics held in Beijing, September 1994. It discusses different aspects of mechanics problems in geodynamics involving the earth's rotation, tectonic analyses of various parts of the world, mineral physics and flow in the mantle, seismic source studies and wave propagation and application of the DDA method in tectonic analysis.
    Pages: Online-Ressource (336 Seiten)
    ISBN: 9783764354121
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Keywords: nuclear explosion monitoring ; nuclear test ban ; seismology ; acoustics
    Description / Table of Contents: This topical volume focuses on the most recent advances that have been achieved in relevant fields of research of nuclear test ban monitoring, including seismology, infrasound- and hydro-acoustics, as well as nuclear physics and atmospheric backtracking. This research has been presented during the special sessions on "Research and Development in Nuclear Explosion Monitoring" convened during the 2007 and 2008 General Assemblies of the European Geosciences Union (EGU). The special sessions were introduced after the Preparatory Commission for the Comprehensive Nuclear Test-Ban Treaty Organization (CTBTO Prepcom) had convened a scientific symposium in 2006 on "CTBT: Synergies with Science 1996-2006 and beyond" marking the tenth anniversary of the United Nations General Assembly’s adoption of the CTBT Treaty. With regard to the seismo-acoustic fields several papers provide important updates on advances made in these fields since publication of ‘Monitoring the Comprehensive Nuclear-Test-Ban Treaty’ (see PAGEOPH topical volumes 158-159, 2001-2002). Moreover, this topical volume expands on these publications by including radionuclide and noble gas monitoring, as well as atmospheric transport modeling. In these two areas, significant progress has been made in recent years. Two papers studying the 2006 North Korean nuclear test elucidate how progress made in the relevant fields has allowed for a good understanding on the characteristics of this underground nuclear test.
    Pages: Online-Ressource (246 Seiten)
    ISBN: 9783034603706
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: engineering ; geophysics ; mining ; monitoring technology ; seismic monitoring ; seismic tomography ; seismology ; stress re-distribution
    Description / Table of Contents: Stress re-distribution as a result of exploitation of mineral, hydrocarbon, geothermal, and water resources cannot be eliminated. The effort must be directed to a better understanding of the underlying processes for the management of the hazard and risk associated with these operations. The study of induced seismicity has continually evolved over the past couple of decades, as underlined by both the number and complexity of applied studies required to satisfy the increased economic demands, assure the safety of the workforce and equipment, and protect the environment. A considerable effort has been put into the development of passive monitoring technology, specialized products and services being available for a wide range of applications. The recording of substantial high quality seismic data has stimulated the work on theoretical and practical aspects related to these applications, involving not only seismological knowledge, but also elements of rock mechanics, and an understanding of mining, geotechnical, and petroleum engineering. Pure and Applied Geophysics has largely contributed to raising the profile of induced seismicity research and its credibility. The range of specific analyses included in the present collection of studies expresses how powerful and resourceful passive seismic monitoring has become to so many applications. Seismic data are routinely evaluated for a series of development activities specific to each application. Engineering practice is continually improved based on trials and analyses of the ground response and stress levels, confirmed through the monitoring of seismicity. We are better equipped than ever to provide management decisions based on formalized, quantitative, and thus objective assessment.
    Pages: Online-Ressource (213 Seiten)
    ISBN: 9783034603058
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: geodynamics ; seismology
    Description / Table of Contents: Variations in seismic Q are sensitive to a much greater extent than are seismic velocity variations on factors such as temperature, fluid content, and the movement of solid state defects in the earth. For that reason an understanding of Q and its variation with position in the earth and with time should provide information in earth's tectonic evolution, as well as on aspects of its internal structure. Progress in understanding Q has suffered from difficulty in obtaining reliable amplitude data at global and temporary stations. Moreover, laboratory determinations of Q, until recently, were most often made at frequencies much higher than those measured by seismologists for waves propagating through the earth. Recent advances in seismic station distribution and quality, as well as in methodology at both high and low fequencies, have greatly improved the quality of observational data available to seismologists from global stations. Concurrent advances have been made in measuring Q using laboratory samples at frequencies that pertain to the earth and in theoretical understanding of seismic wave attenuation. Papers of this volume present new information on Q in the earth from several perspectives: methodology, results from global and regional observations of both body and surface waves, laboratory measurements, and theoretical understanding. The editors believe that we have reached a new threshold in Q studies and that advances in data quality and methodology will spur increased interest in this difficult, but interesting field.
    Pages: Online-Ressource (496 Seiten)
    ISBN: 9783764360498
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: seismicity ; geodynamics ; seismology
    Description / Table of Contents: This volume contains 18 papers from 8 countries dealing with different aspects of triggered and induced seismicity. In situ observations of the phenomenon include examples of seismicity due to reservoirs, hard-rock mines, coal mines, mine collapses, brine production caverns, fluid injections, and geothermal hot-dry-rock projects. High-frequency acoustic emission studies from laboratory experiments and hard-rock mines have also been reported. Besides providing case studies of previously unavailable observations of seismicity, the present volume contains investigations of the causes and source mechanism of seismic events, determination of source parameters, seismic hazard as related to the design of support systems for underground openings and procedures for closure of brine production caverns, and the use of seismic and non-destructive techniques in assessing rock damage, measuring dynamic elastic moduli and detecting discontinuities. This collection of papers provides an excellent indication of the state of the art, recent developments and outstanding challenges facing scientists and engineers in understanding the causes and alleviating the effects of induced seismicity.
    Pages: Online-Ressource (343 Seiten)
    ISBN: 9783764358785
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: seismic waves ; geophysics ; seismology
    Description / Table of Contents: The special issue contains contributions presented at the international workshop Seismic waves in laterally inhomo- geneous media IV, which was held at the Castle of Trest, Czech Republic, May 22-27, 1995. The workshop, which was attended by about 100 seismologists from more than 10 countries, was devoted mainly to the current state of theoretical and computational means of study of seismic wave propagation in complex structures. The special issue can be of interest for theoretical, global and explorational seismologists. The first part contains papers dealing with the study and the use of various methods of solving forward and inverse problems in complicated structures. Among other methods, discrete-wave number method, the finite-difference method, the edge-wave supperposition method and the ray method are studied and used. Most papers contained in the second part are related to the ray method. The most important topics are two-point ray tracing, grid calculations of travel times and amplitudes and seismic wave propagation in anisotropic media.
    Pages: Online-Ressource (342 Seiten) , Illustrationen, Diagramme, Karten
    ISBN: 9783764356484
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: seismicity ; geodynamics ; seismology
    Description / Table of Contents: The perturbation of the earth by mankind causes earthquakes in a variety of situations. This phenomenon continues to be a major concern to engineers and scientists concerned with the mitigation of the consequences of this seismicity, as well as better understanding the processes at its origin. The present volume contains twelve papers from six countries, dealing with observations of triggered and induced seismicity in four continents. The reported cases include seismicity due to hard-rock mines, coal mines, underground research facilities for nuclear waste disposal, water injections, reservoirs, acquifers and oil fields. This volume provides case studies of previously unavailable observations of this phenomenon, investigations of the cause and source mechanism of seismic events, studies of source location distributions, determinations of seismic source parameters, cases of the use of such parameters in assessing rockburst hazard in mines, and measurements of velocity an attenuation properties of rock masses. The present collection of papers provides an excellent indication of the current state of the art and new developments in this area of research.
    Pages: Online-Ressource (233 Seiten)
    ISBN: 9783764360481
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Keywords: earthquake ; seismology ; geology ; geophysics
    Description / Table of Contents: The study of earthquakes combines science, technology and expertise in infrastructure and engineering in an effort to minimize human and material losses when their occurrence is inevitable. This book is devoted to various aspects of earthquake research and analysis, from theoretical advances to practical applications. Different sections are dedicated to ground motion studies and seismic site characterization, with regard to mitigation of the risk from earthquake and ensuring the safety of the buildings under earthquake loading. The ultimate goal of the book is to encourage discussions and future research to improve hazard assessments, dissemination of earthquake engineering data and, ultimately, the seismic provisions of building codes.
    Pages: Online-Ressource (380 Seiten)
    ISBN: 9789533078403
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Keywords: Computer science ; Computer communication systems ; Computers and civilization ; Management information systems ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Communications Engineering, Networks ; Computers and Society ; Management of Computing and Information Systems
    Description / Table of Contents: This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics.   Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed:   - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    Pages: Online-Ressource (IX, 243 pages) , 61 illustrations
    ISBN: 9783642303821
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Keywords: earthquake ; seismology ; geology ; geophysics
    Description / Table of Contents: The mitigation of earthquake-related hazards represents a key role in the modern society. The main goal of this book is to present 9 scientific papers focusing on new research and results on earthquake seismology. Chapters of this book focus on several aspect of seismology ranging from historical earthquake analysis, seismotectonics, and damage estimation of critical facilities.
    Pages: Online-Ressource (207 Seiten)
    ISBN: 9789535110545
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Keywords: Computer science ; Production management ; Management information systems ; Special purpose computers ; Software engineering ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business IT Infrastructure ; Computer Appl. in Administrative Data Processing ; Operations Management ; Software Engineering ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Introduction to the Internet of Things --- The Need for a Common Ground for the IoT — The History and Reasoning Behind the IoT — A Project --- The IoT Architectural Reference Model as Enabler --- IoT in Practice: Examples — IoT in Logistics and Health --- IoT — A Guidance to the ARM --- A Process to Generate Concrete Architectures --- IoT Reference Model --- IoT Reference Architecture --- The IoT ARM Reference Manual --- Interactions --- Toward a Concrete Architecture --- ARM Testimonials --- Summary and Outlook
    Pages: Online-Ressource (X, 349 pages) , 131 illustrations, 116 illustrations in color
    ISBN: 9783642404030
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: seismic waves ; seismology
    Description / Table of Contents: This is volume I of the two-volume special issue Scattering and Attenuation of Seismic Waves which will contain total 17 invited review papers and about 30 c- tributed papers. The scope and contents of the special issue are described in the following Introduction. This volume includes 21 contributed papers arranged in the following order: Scattering theory and modeling including the scattering attenuation and its separation from the intrinsic attenuation; numerical method and simulation; field observation including coda Q and surface wave Q measurement; inversion; laboratory attenuation measurement of rock samples.
    Pages: Online-Ressource (VIII, 447 Seiten)
    ISBN: 9783034877220
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: seismic waves ; seismology
    Pages: Online-Ressource (VII, 191 Seiten)
    ISBN: 9783034863636
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Keywords: earthquake ; seismology ; geology ; geophysics
    Description / Table of Contents: This book is devoted to different aspects of earthquake research. Depending on their magnitude and the placement of the hypocenter, earthquakes have the potential to be very destructive. Given that they can cause significant losses and deaths, it is really important to understand the process and the physics of this phenomenon. This book does not focus on a unique problem in earthquake processes, but spans studies on historical earthquakes and seismology in different tectonic environments, to more applied studies on earthquake geology.
    Pages: Online-Ressource (370 Seiten)
    ISBN: 9789533079912
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Keywords: earthquake ; seismology ; geology ; geophysics
    Description / Table of Contents: The study of earthquakes plays a key role in order to minimize human and material losses when they inevitably occur. Chapters in this book will be devoted to various aspects of earthquake research and analysis. The different sections present in the book span from statistical seismology studies, the latest techniques and advances on earthquake precursors and forecasting, as well as, new methods for early detection, data acquisition and interpretation. The topics are tackled from theoretical advances to practical applications.
    Pages: Online-Ressource (460 Seiten)
    ISBN: 9789535101345
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Keywords: earth and planetary sciences ; geology and geophysics ; seismology ; earthquake
    Description / Table of Contents: The mitigation of earthquake-related hazards represents a key role in the modern society. The mitigation of such kind of hazards spans from detailed studies on seismicity, evaluation of site effects, and seismo-induced landslides, tsunamis as well as and the design and analysis of structures to resist such actions. The study of earthquakes ties together science, technology and expertise in infrastructure and engineering in an effort to minimize human and material losses when they inevitably occur. Chapters deal with different topics aiming to mitigate geo-hazards such as: Seismic hazard analysis, Ground investigation for seismic design, Seismic design, assessment and remediation, Earthquake site response analysis and soil-structure interaction analysis.
    Pages: Online-Ressource (300 Seiten)
    ISBN: 9789535110385
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Keywords: earthquake ; seismology ; geology ; geophysics ; earthquake engineering
    Description / Table of Contents: This book deals with earthquake-resistant structures, such as, buildings, bridges and liquid storage tanks. It contains twenty chapters covering several interesting research topics written by researchers and experts in the field of earthquake engineering. The book covers seismic-resistance design of masonry and reinforced concrete structures to be constructed as well as safety assessment, strengthening and rehabilitation of existing structures against earthquake loads. It also includes three chapters on electromagnetic sensing techniques for health assessment of structures, post earthquake assessment of steel buildings in fire environment and response of underground pipes to blast loads. The book provides the state-of-the-art on recent progress in earthquake-resistant structures. It should be useful to graduate students, researchers and practicing structural engineers.
    Pages: Online-Ressource (536 Seiten)
    ISBN: 9789535101239
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Keywords: earth and planetary sciences ; geology and geophysics ; seismology ; earthquake ; earthquake engineering ; geotechnics
    Description / Table of Contents: This book sheds lights on recent advances in Geotechnical Earthquake Engineering with special emphasis on soil liquefaction, soil-structure interaction, seismic safety of dams and underground monuments, mitigation strategies against landslide and fire whirlwind resulting from earthquakes and vibration of a layered rotating plant and Bryan's effect. The book contains sixteen chapters covering several interesting research topics written by researchers and experts from several countries. The research reported in this book is useful to graduate students and researchers working in the fields of structural and earthquake engineering. The book will also be of considerable help to civil engineers working on construction and repair of engineering structures, such as buildings, roads, dams and monuments.
    Pages: Online-Ressource (436 Seiten)
    ISBN: 9789535100256
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: geodynamics ; geophysics ; seismology
    Description / Table of Contents: Geodynamics concerns with the dynamics of the global motion of the earth, of the motion in the earth's interior and its interaction with surface features, together with the mechanical processes in the deformation and rupture of geological structures. Its final object is to determine the driving mechanism of these motions which is highly interdisciplinary. In preparing the basic geological, geophysical data required for a comprehensive mechanical analysis, there are also many mechanical problems involved, which means the problem is coupled in a complicated manner with geophysics, rock mechanics, seismology, structural geology etc. This topical issue is Part I of the Proceedings of an IUTAM / IASPEI Symposium on Mechanics Problems in Geodynamics held in Beijing, September 1994. It addresses different aspects of mechanics problems in geodynamics involving tectonic analyses, lithospheric structures, rheology and the fracture of earth media, mantle flow, either globally or regionally, and either by forward or inverse analyses or numerical simulation.
    Pages: Online-Ressource (385 Seiten)
    ISBN: 9783764351045
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: civil engineering ; engineering seismology ; geodynamics ; mining ; seismology
    Description / Table of Contents: Induced seismic events are of high scientific and economic significance. They are the result of human activities interacting with regional and local tectonics, changing the local crustal stress state by mining, extraction of rock masses, injection of fluids into the rock massif, and by changing the surface loading and pore pressure state near large reservoirs. Within Europe the study of induced seismic events has a long tradition and international scientific organizations have actively stimulated the co-operation in this field. During its General Assembly in September 1994, the European Seismological Society organized the symposium "Induced Seismic Events". The focus of this symposium was concentrated on induced events in central and eastern Europe, as well as in the former Soviet Union. The major contributions to the symposium, and also some Chinese, Canadian, and South African results are presented here. Case studies as well as data analyses and methodological studies are included. Seismologists and specialists working in the field of geohazard prevention will find much information in this volume that is pertinent to their work.
    Pages: Online-Ressource (227 Seiten)
    ISBN: 9783764354541
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Keywords: seismicity ; geodynamics ; seismology
    Description / Table of Contents: This volume contains twenty-five research papers on seismicity patterns, their interpretation and their possible relevance to learning how to predict earthquakes. The interpretation of seismicity patterns has become somewhat controversial. Some researchers present case histories suggesting that earthquakes may be predicted by increased seismic moment release or seismic quiescence and, in general, by understanding the processes of self-organized criticality. Others deny these hypotheses. Although the problem of recognizing foreshocks in real time remains unsolved, new properties of microearthquakes as a function of time are coming to light. Computer modeling of seismicity also is advancing in sophistication and relevance. Surprisingly, b-values seem to hold substantial information about varying local conditions of earthquake generation.
    Pages: Online-Ressource (524 Seiten)
    ISBN: 9783764362096
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Unknown
    Rijeka : InTech
    Keywords: earthquake ; tsunami ; seismic waves ; seismology ; geology ; geophysics
    Description / Table of Contents: The importance of seismic wave research lies not only in our ability to understand and predict earthquakes and tsunamis, it also reveals information on the Earth's composition and features in much the same way as it led to the discovery of Mohorovicic's discontinuity. As our theoretical understanding of the physics behind seismic waves has grown, physical and numerical modeling have greatly advanced and now augment applied seismology for better prediction and engineering practices. This has led to some novel applications such as using artificially-induced shocks for exploration of the Earth's subsurface and seismic stimulation for increasing the productivity of oil wells. This book demonstrates the latest techniques and advances in seismic wave analysis from theoretical approach, data acquisition and interpretation, to analyses and numerical simulations, as well as research applications. A review process was conducted in cooperation with sincere support by Drs. Hiroshi Takenaka, Yoshio Murai, Jun Matsushima, and Genti Toyokuni.
    Pages: Online-Ressource (326 Seiten)
    ISBN: 9789533079448
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Keywords: seismology ; seismicity ; energy
    Description / Table of Contents: In the past several years, some energy technologies that inject or extract fluid from the Earth, such as oil and gas development and geothermal energy development, have been found or suspected to cause seismic events, drawing heightened public attention. Although only a very small fraction of injection and extraction activities among the hundreds of thousands of energy development sites in the United States have induced seismicity at levels noticeable to the public, understanding the potential for inducing felt seismic events and for limiting their occurrence and impacts is desirable for state and federal agencies, industry, and the public at large. To better understand, limit, and respond to induced seismic events, work is needed to build robust prediction models, to assess potential hazards, and to help relevant agencies coordinate to address them. Induced Seismicity Potential in Energy Technologies identifies gaps in knowledge and research needed to advance the understanding of induced seismicity; identify gaps in induced seismic hazard assessment methodologies and the research to close those gaps; and assess options for steps toward best practices with regard to energy development and induced seismicity potential.
    Pages: Online-Ressource (XII, 225 Seiten)
    ISBN: 9780309253673
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Unknown
    Rijeka : InTech
    Keywords: geology ; geophysics ; tectonics ; seismology
    Description / Table of Contents: Chapter 1: Cyclic Development of Axial Parts of Slow-Spreading Ridges: Evidence from Sierra Leone Area, the Mid-Atlantic Ridge, 5-7°N by E.V. Sharkov --- Chapter 2: Features of Caucasian Segment of the Alpine-Himalayan Convergence Zone: Geological, Volcanological, Neotectonical, and Geophysical Data by E.V. Sharkov, V.A. Lebedev, A.G. Rodnikov, A.V. Chugaev, N.A. Sergeeva and L.P. Zabarinskaya --- Chapter 3: 3D Modelling and Basement Tectonics of the Niger Delta Basin from Aeromagnetic Data by A.A. Okiwelu and I.A. Ude --- Chapter 4: Seismic Paleo-Geomorphic System of the Extensional Province of the Niger Delta: An Example of the Okari Field by Muslim B. Aminu and Moses O. Olorunniwo --- Chapter 5: Geodynamic and Tectonostratigrafic Study of a Continental Rift: The Triassic Cuyana Basin, Argentina by Silvia Patricia Barredo --- Chapter 6: Role of the NE-SW Hercynian Master Fault Systems and Associated Lineaments on the Structuring and Evolution of the Mesozoic and Cenozoic Basins of the Alpine Margin, Northern Tunisia by Fetheddine Melki, Taher Zouaghi, Mohamed Ben Chelbi, Mourad Bédir and Fouad Zargouni --- Chapter 7: An Assessment of the Earthquakes of Ancient Troy, NW Anatolia, Turkey by Akın Kürçer, Alexandros Chatzipetros, Salih Zeki Tutkun, Spyros Pavlides, Süha Özden, George Syrides, Kostas Vouvalidis, Emin Ulugergerli, Özkan Ateş and Yunus Levent Ekinci --- Chapter 8: Paleoseismological Three Dimensional Virtual Photography Method; A Case Study: Bağlarkayası-2010 Trench, Tuz Gölü Fault Zone, Central Anatolia, Turkey by Akın Kürçer and Yaşar Ergun Gökten --- Chapter 9: Structural Geological Analysis of the High Atlas (Morocco): Evidences of a Transpressional Fold-Thrust Belt by Alessandro Ellero, Giuseppe Ottria, Marco G. Malusà and Hassan Ouanaimi --- Chapter 10: Plate Tectonic Evolution of the Southern Margin of Laurussia in the Paleozoic by Jan Golonka and Aleksandra Gawęda --- Chapter 11: Was the Precambrian Basement of Western Troms and Lofoten-Vesterålen in Northern Norway Linked to the Lewisian of Scotland? A Comparison of Crustal Components, Tectonic Evolution and Amalgamation History" by Steffen G. Bergh, Fernando Corfu, Per Inge Myhre, Kåre Kullerud, Paul E.B. Armitage, Klaas B. Zwaan, Erling K. Ravna, Robert E. Holdsworth and Anupam Chattopadhya
    Pages: Online-Ressource (330 Seiten)
    ISBN: 9789535106753
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Information Storage and Retrieval ; Multimedia Information Systems ; Communications Engineering, Networks ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will be a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.  This book is published in full compliance with the Open Access publishing initiative; it is based on the research carried out within the Future Internet Assembly (FIA). It contains a sample of representative results from the recent FIA meetings spanning a broad range of topics, all being of crucial importance for the future Internet.  The book includes 32 contributions and has been structured into the following sections, each of which is preceded by a short introduction: Foundations: architectural issues; socio-economic issues; security and trust; and experiments and experimental design. Future Internet Areas: networks, services, and content; and applications
    Pages: Online-Ressource (XVI, 465 pages)
    ISBN: 9783642208980
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Information Storage and Retrieval ; Computers and Society
    Description / Table of Contents: Software Driven Networks, Virtualisation, Programmability and Autonomic Management --- Towards a Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet (SmartenIT) --- The NEBULA Future Internet Architecture --- Open the Way to Future Networks – A Viewpoint Framework from ITU-T --- Towards a Minimal Core for Information-Centric Networking --- Managing QoS for Future Internet Applications over Virtual Sensor Networks --- High Availability in the Future Internet --- Integrating OpenFlow in IMS Networks and Enabling for Future Internet Research and Experimentation --- Computing and Networking Clouds Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds --- Cloud–Based Evaluation Framework for Big Data --- Optimizing Service Ecosystems in the Cloud --- Resource Optimisation in IoT Cloud Systems by Using Matchmaking and Self-management Principles --- Towards a Secure Network Virtualization Architecture for the Future Internet --- Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures --- Internet of Things --- IoT6 – Moving to an IPv6-Based Future IoT --- SmartSantander: Internet of Things Research and Innovation through Citizen Participation --- A Cognitive Management Framework for Empowering the Internet of Things --- Building Modular Middlewares for the Internet of Things with OSGi --- Towards an Architecture for Future Internet Applications --- ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability --- Test-Enabled Architecture for IoT Service Creation and Provisioning --- Enabling Technologies and Economic Incentives Sustainable Wireless Broadband Access to the Future Internet --- The EARTH Project --- An Internet-Based Architecture Supporting Ubiquitous Application User Interfaces --- Cooperative Strategies for Power Saving in Multi-standard Wireless Devices --- Counting the Cost of FIRE: Overcoming Barriers to Sustainable Experimentation Facilities --- User Involvement in Future Internet Projects --- Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play --- Book Sponsoring Projects Overview 3DLife - Bringing the Media Internet to Life --- CONCORD Project Management of the Future Internet --- FLAMINGO NoE Project Management of the Future Internet --- The GEYSERS Concept and Major Outcomes --- iCore: A Cognitive Management Framework for the Internet of Things --- IoT6 Project in a Nutshell --- Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand --- The SmartenIT STREP Project: Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet --- The SmartSantander Project --- UniverSelf, Realizing Autonomics for Future Networks
    Pages: Online-Ressource (XLIV, 369 pages) , 131 illustrations
    ISBN: 9783642380822
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: seismic waves ; geophysics ; seismology
    Description / Table of Contents: The special issue contains contributions presented at the international workshop Seismic waves in laterally inhomogeneous media IV, which was held at the Castle of Trest, Czech Republic, May 22-27, 1995. The workshop, which was attended by about 100 seismologists from more than 10 countries, was devoted mainly to the current state of theoretical and computational means of study of seismic wave propagation in complex structures. The special issue can be of interest for theoretical, global and explorational seismologists. The first part contains papers dealing with the study and the use of various methods of solving forward and inverse problems in complicated structures. Among other methods, discrete-wave number method, the finite-difference method, the edge-wave supperposition method and the ray method are studied and used. Most papers contained in the second part are related to the ray method. The most important topics are two-point ray tracing, grid calculations of travel times and amplitudes and seismic wave propagation in anisotropic media.
    Pages: Online-Ressource (372 Seiten)
    ISBN: 9783034890496
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Computer science ; Computational linguistics ; Computer Science ; Language Translation and Linguistics ; Computational Linguistics
    Description / Table of Contents: Key Messages --- Executive Summary --- 1.Introduction --- 2.Multilingual Europe: Facts, Challenges, Opportunities --- 3.Major Trends in Information and Communication Technologies --- 4.Language Technology 2012: Current State and Opportunities --- 5.Language Technology 2020: The META-NET Technology Vision --- 6.Language Technology 2020: Priority Research Themes --- 7.Towards a Shared European Programme for Multilingual Europe 2020: Next Steps --- A.References --- B.List of Key Contributors --- C.Milestones and History of the Strategic Research Agenda --- D.About META-NET --- E.Members of META-NET --- F.Abbreviations and Acroynms
    Pages: Online-Ressource (VIII, 87 pages) , 22 illustrations in color
    ISBN: 9783642363498
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Computer science ; Management information systems ; Industrial management ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business Process Management ; Computer Appl. in Administrative Data Processing ; Management of Computing and Information Systems
    Description / Table of Contents: Introduction --- The Problem - Part I --- The Solution --- Transition --- The Problem - Part II --- The Solution - Part II --- Transition - Part II --- The Problem - Part III --- The Solution - Part III --- Transition - Part III --- The Problem, The Solution and The End - Final Part --- Troubleshooting
    Pages: Online-Ressource (X, 143 pages) , 210 illustrations in color
    ISBN: 9783642369049
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Unknown
    Basel, Boston, Berlin : Birkhäuser
    Keywords: geophysics ; seismology
    Description / Table of Contents: Earthquakes in shallow subduction zones account for the greatest part of seismic energy release in the Earth and often cause significant damage; in some cases they are accompanied by devastating tsunamis. Understanding the physics of seismogenic and tsunamigenic processes in such zones continues to be a challenging focus of ongoing research. The seismologic and geodetic work reported in this volume highlights the recent advances made toward quantifying and understandig the role of shallow plate coupling in the earthquake generation process. The relation between regional seismotectonics, features in the downgoing plate, and the slip distribution in earthquakes are examined for recent and great historical events. In addition to papers reporting new results, review articles on tsunami and tsunamigenic earthquakes and depth dependent plate interface properties are presented. These observational results, along with complementary laboratory and theoretical studies, can assist in assessing the seismic potential of a given region.
    Pages: Online-Ressource (372 Seiten)
    ISBN: 9783764361464
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Unknown
    Rijeka : InTech
    Keywords: geology ; geophysics ; tectonics ; seismology
    Description / Table of Contents: Chapter 1: Plates Amalgamation and Plate Destruction, the Western Gondwana History by Ngako Vincent and Njonfang Emmanuel --- Chapter 2: Lithospheric Structure and Tectonics of the Eastern Alps – Evidence from New Seismic Data by Ewald Brückl --- Chapter 3: Structure and Plate Tectonic Evolution of the Northern Outer Carpathians by Jan Golonka, Kaja Pietsch and Paweł Marzec --- Chapter 4: Tectonic Model of the Sinai Peninsula Based on Geophysical Investigations by Taha Rabeh --- Chapter 5: Siberia - From Rodinia to Eurasia by Dmitry V. Metelkin, Valery A. Vernikovsky and Alexey Yu. Kazansky --- Chapter 6: Proto-Basin Types of North China Craton (NCC) in Late Triassic and Its Implication for Regional Tectonics of Initial Craton Destruction by Yang Minghui, Liu Chiyang, Zeng Peng, Bai Hua and Zhou Jin --- Chapter 7: Tectonic Implications of Stratigraphy Architecture in Distal Part of Foreland Basin, Southwestern Taiwan by Jong-Chang Wu, Kenn-Ming Yang, Yi-Ru Chen and Wen-Rong Chi --- Chapter 8: Seismic Hazard in Tien Shan: Basement Structure Control Over the Deformation Induced by Indo-Eurasia Collision by Buslov, Mikhail M. and De Grave, Johan --- Chapter 9: Lithosphere as a Nonlinear System: Geodynamic Consequences by E. G. Mirlin --- Chapter 10: Layer-Block Tectonics, a New Concept of Plate Tectonics - An Example from Nansha Micro-Plate, Southern South China Sea by Hai-ling Liu, Hong-bo Zheng, Yan-Lin Wang, Chao-Hua Wu, Mei-Song Zhao and Yun-Kong Du --- Chapter 11: The Role of Geoelectrical DC Methods in Determining the Subsurface Tectonics Features. Case Studies from Syria by Jamal Asfahani --- Chapter 12: Salt Tectonics of the Lisan Diapir Revealed by Synthetic Aperture Radar Images by Damien Closson, Najib Abou Karaki, Nada Milisavljević, Frédéric Hallot, and Marc Acheroy --- Chapter 13: Mantle-like Trace Element Composition of Petroleum – Contributions from Serpentinizing Peridotites by Peter Szatmari, Teresa Cristina O. da Fonseca and Norbert F. Miekeley
    Pages: Online-Ressource (358 Seiten)
    ISBN: 9789533075457
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Unknown
    Dordrecht : Springer
    Keywords: deep earth processes ; earth science encyclopedia ; lithosphere ; mathematical geophysics ; plate tectonics ; potential fields ; seismology ; solid earth geophysics ; solid earth science
    Description / Table of Contents: The past few decades have witnessed the growth of the Earth Sciences in the pursuit of knowledge and understanding of the planet that we live on. This development addresses the challenging endeavor to enrich human lives with the bounties of Nature as well as to preserve the planet for the generations to come. Solid Earth Geophysics aspires to define and quantify the internal structure and processes of the Earth in terms of the principles of physics and forms the intrinsic framework, which other allied disciplines utilize for more specific investigations. The first edition of the Encyclopedia of Solid Earth Geophysics was published in 1989 by Van Nostrand Reinhold publishing company. More than two decades later, this new volume, edited by Prof. Harsh K. Gupta, represents a thoroughly revised and expanded reference work. It brings together more than 200 articles covering established and new concepts of Geophysics across the various sub-disciplines such as Gravity, Geodesy, Geomagnetism, Seismology, Seismics, Deep Earth Processes, Plate Tectonics, Thermal Domains, Computational Methods, etc. in a systematic and consistent format and standard. It is an authoritative and current reference source with extraordinary width of scope. It draws its unique strength from the expert contributions of editors and authors across the globe. It is designed to serve as a valuable and cherished source of information for current and future generations of professionals.
    Pages: Online-Ressource (XXXVIII, 1540 Seiten)
    Edition: 1st ed.
    ISBN: 9789048187027
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Keywords: Computer science ; Computer communication systems ; Data mining ; User interfaces (Computer systems) ; Artificial intelligence ; Pattern recognition ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Pattern Recognition ; Computer Communication Networks
    Description / Table of Contents: Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied originates from one domain.   The focus of this book, and the BISON project from which the contributions originate, is a network-based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of seeking well-defined global or local patterns, the aim was to find domain-bridging associations. These are particularly interesting if they are sparse and have not been encountered before.   The 32 contributions presented in this state-of-the-art survey, together with a detailed introduction to the book, are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.  
    Pages: Online-Ressource (X, 486 pages) , 146 illustrations
    ISBN: 9783642318306
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Keywords: Computer science ; Computer communication systems ; Data mining ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Data Mining and Knowledge Discovery ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must. The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures
    Pages: Online-Ressource (XXV, 252 pages)
    ISBN: 9783642302411
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Keywords: vibration ; earthquake ; seismology ; engineering
    Description / Table of Contents: Vibration is a phenomenon that we can perceive in many systems. Their effects are as diverse as the personal discomfort that can produce the unevenness of a road or the collapse of a building or a bridge during an earthquake. This book is a compendium of research works on vibration analysis and control. It goes through new methodologies that help us understand and mitigate this phenomenon. This book is divided into two sections. The first one is devoted to new advances on vibration analysis while the second part is a series of case studies that illustrate novel techniques on vibration control. The applications are varied and include areas such as vehicle suspension systems, wind turbines and civil engineering structures.
    Pages: Online-Ressource (278 Seiten)
    ISBN: 9789535106999
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Unknown
    Rijeka : InTech
    Keywords: earthquake ; seismology ; geology ; geophysics
    Description / Table of Contents: Recent major earthquakes around the world have shown the vulnerability of infrastructure and the need for research to better understand the nature of seismic events and their effects on structures. As a result, earthquake engineering research has been expanding as more and more data become available from a large array of seismic instruments, large scale experiments and numerical simulations. The first part of this book presents results from some of the current seismic research work including three-dimensional wave propagation in different soil media, seismic loss assessment, probabilistic hazard analysis, geotechnical problems including soil-structure interaction. The second part of the book focuses on the seismic behavior of structures including historical and monumental structures, bridge embankments, and different types of bridges and bearings.
    Pages: Online-Ressource (336 Seiten)
    ISBN: 9789535106944
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine. It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work
    Pages: Online-Ressource (XX, 272 pages) , 74 illustrations
    ISBN: 9781430265726
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Keywords: Computer science ; Computer organization ; Computer Science ; Computer Science, general ; Computer Systems Organization and Communication Networks
    Description / Table of Contents: Apress is proud to announce that Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources. Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - "chirps". Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. This must change. The architecture of the Internet of Things must evolve now by incorporating simpler protocols toward at the edges of the network, or remain forever inefficient. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored
    Pages: Online-Ressource (XXVI, 192 pages) , 75 illustrations
    ISBN: 9781430257417
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Text processing (Computer science) ; Image processing ; Computer Science ; Image Processing and Computer Vision ; Document Preparation and Text Processing
    Description / Table of Contents: Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors actually work, how they are designed, with observations about tuning the methods for achieving robustness and invariance targets for specific applications. The survey is broader than it is deep, with over 540 references provided to dig deeper. The taxonomy includes search methods, spectra components, descriptor representation, shape, distance functions, accuracy, efficiency, robustness and invariance attributes, and more. Rather than providing ‘how-to’ source code examples and shortcuts, this book provides a counterpoint discussion to the many fine opencv community source code resources available for hands-on practitioners
    Pages: Online-Ressource (XXXI, 508 pages) , 216 illustrations
    ISBN: 9781430259305
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Android on x86: an Introduction to Optimizing for Intel® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel’s x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x86 devices. The fundamental idea is that extending your applications to support x86 or creating new ones is not difficult, but it is imperative to know all of the technicalities. This book is dedicated to providing you with an awareness of these nuances and an understanding of how to tackle them. Second, and most importantly, this book provides a one-stop detailed resource for best practices and procedures associated with the installation issues, hardware optimization issues, software requirements, programming tasks, and performance optimizations that emerge when developers consider the x86 Android devices. Optimization discussions dive into native code, hardware acceleration, and advanced profiling of multimedia applications. The authors have collected this information so that you can use the book as a guide for the specific requirements of each application project. This book is not dedicated solely to code; instead it is filled with the information you need in order to take advantage of x86 architecture. It will guide you through installing the Android SDK for Intel Architecture, help you understand the differences and similarities between processor architectures available in Android devices, teach you to create and port applications, debug existing x86 applications, offer solutions for NDK and C++ optimizations, and introduce the Intel Hardware Accelerated Execution Manager. This book provides the most useful information to help you get the job done quickly while utilizing best practices
    Pages: Online-Ressource (XXVII, 380 pages) , 180 illustrations
    ISBN: 9781430261315
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, wellness and environmental sensing.  It discusses the social, regulatory, and design considerations specific to these domains. The book provides an application-based approach using real-world examples to illustrate the application of sensor technologies in a practical and experiential manner. The book  guides the reader from the formulation of the research question, through the design and validation process, to the deployment and management phase of sensor applications.  The processes and examples used in the book are primarily based on research carried out by Intel or joint academic research programs. "Sensor Technologies: Healthcare, Wellness and Environmental Applications provides an extensive overview of sensing technologies and their applications in healthcare, wellness, and environmental monitoring. From sensor hardware to system applications and case studies, this book gives readers an in-depth understanding of the technologies and how they can be applied. I would highly recommend it to students or researchers who are interested in wireless sensing technologies and the associated applications." Dr. Benny Lo Lecturer, The Hamlyn Centre, Imperial College of London     "This timely addition to the literature on sensors covers the broad complexity of sensing, sensor types, and the vast range of existing and emerging applications in a very clearly written and accessible manner.  It is particularly good at capturing the exciting possibilities that will occur as sensor networks merge with cloud-based ‘big data’ analytics to provide a host of new applications that will impact directly on the individual in ways we cannot fully predict at present.  It really brings this home through the use of carefully chosen case studies that bring the overwhelming concept of 'big data' down to the personal level of individual life and health."   Dermot Diamond Director, National Centre for Sensor Research, Principal Investigator, CLARITY Centre for Sensor Web Technologies, Dublin City University                                                                      "Sensor Technologies: Healthcare, Wellness and Environmental Applications takes the reader on an end-to-end journey of sensor technologies, covering the fundamentals from an engineering perspective, introducing how the data gleaned can be both processed and visualized, in addition to offering exemplar case studies in a number of application domains.  It is a must-read for those studying any undergraduate course that involves sensor technologies.  It also provides a thorough foundation for those involved in the research and development of applied sensor systems.  I highly recommend it to any engineer who wishes to broaden their knowledge in this area!" Chris Nugent Professor of Biomedical Engineering, University of Ulster  
    Pages: Online-Ressource (XXV, 336 pages) , 108 illustrations
    ISBN: 9781430260141
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Intel® Xeon Phi™ Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It also examines the source code-level optimizations that can be performed to exploit the powerful features of the processor. Xeon Phi is at the heart of world’s fastest commercial supercomputer, which thanks to the massively parallel computing capabilities of Intel Xeon Phi processors coupled with Xeon Phi coprocessors attained 33.86 teraflops of benchmark performance in 2013. Extracting such stellar performance in real-world applications requires a sophisticated understanding of the complex interaction among hardware components, Xeon Phi cores, and the applications running on them. In this book, Rezaur Rahman, an Intel leader in the development of the Xeon Phi coprocessor and the optimization of its applications, presents and details all the features of Xeon Phi core design that are relevant to the practice of application developers, such as its vector units, hardware multithreading, cache hierarchy, and host-to-coprocessor communication channels. Building on this foundation, he shows developers how to solve real-world technical computing problems by selecting, deploying, and optimizing the available algorithms and data structure alternatives matching Xeon Phi’s hardware characteristics. From Rahman’s practical descriptions and extensive code examples, the reader will gain a working knowledge of the Xeon Phi vector instruction set and the Xeon Phi microarchitecture whereby cores execute 512-bit instruction streams in parallel
    Pages: Online-Ressource (XXI, 232 pages)
    ISBN: 9781430259275
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Keywords: Computer science ; Data encryption (Computer science) ; Database management ; Computer Science ; Data Encryption ; Database Management
    Description / Table of Contents: This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!   John McAuley,EMC Corporation "This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud."   Alex Rodriguez,  Expedient Data Centers "This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk."   Pete Nicoletti. Virtustream Inc. Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server’s boot process to fit the datacenter’s requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. With a foreword from Albert Caballero, the CTO at Trapezoid
    Pages: Online-Ressource (XVII, 156 pages) , 56 illustrations
    ISBN: 9781430261490
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer programming ; Programming languages (Electronic computers) ; Computer Science ; Programming Techniques ; Programming Languages, Compilers, Interpreters
    Description / Table of Contents: The book is great! It's clear and easy to read, with loads of examples that showed my students what to do. -- Larry Snyder, Emeritus Professor, University of Washington, Department of Computer Science and Engineering "Having the TouchDevelop book available made our events so much easier. Students could figure things out for themselves with help from the book." -- Jennifer Marsman, Microsoft Principal Developer Evangelist Mobile devices such as smartphones and tablets are set to become the main computers that virtually all people will own and carry with them at all times. And yet,mobile devices are not yet used for all computing tasks. A project at Microsoft Research was created to answer a simple question: "It is possible to create interesting apps directly on a smartphone or tablet, without using a separate PC or a keyboard?" The result is TouchDevelop, a programming environment that runs on all modern mobile devices such as Windows Phone, iPhone, iPad, Android phones and tablets, and also on PCs and Macs. This book walks you through all of the screens of the TouchDevelop app, and it points out similarities and differences of the TouchDevelop language compared to other programming languages. For users, the book can serve as a handyreference next to the phone. The book systematically addresses all programming language constructs, starting from the very basic constructs such as variables and loops. The book also explores many of the phone sensors and data sources which make creating apps for mobile devices so rewarding. If you are new to programming with TouchDevelop, or if you have not yet worked on touchscreen devices, we suggest that you read the book starting from Chapter 1. If you are already familiar with the basic paradigm of the TouchDevelop programming environment, then feel free to jump ahead to the later chapters that address particular topic areas. This book is written from the perspective of a person developing their code using a web browser. The TouchDevelop Web App runs in many modern browsers on many different devices including smartphones and tablets, Macs, PC. All screenshots and navigation instructions refer to the TouchDevelop Web App running in a browser. For Windows Phone, there is a dedicated TouchDevelop app in the Windows Phone Store which gives access to many more sensors and data sources. Starting with the TouchDevelop app v3.0 for Windows Phone 8, the phone app will share the same look and navigation structure and all features of the Web App
    Pages: Online-Ressource (XIX, 270 pages) , 69 illustrations
    Edition: 3rd edition
    ISBN: 9781430261377
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team’s findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. His personal blog about programming is BytesThink (www.bytesthink.com)
    Pages: Online-Ressource (XXII, 680 pages) , 256 illustrations
    ISBN: 9781430268383
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app’s UI, and C++/Qt for the application logic. No prior knowledge of C++ is assumed and the book covers the fundamental aspects of the language for writing BlackBerry 10 apps. Also a particular emphasis is put on how to create a visually enticing user experience with the Cascades framework, which is based on Qt and QML. Starting with the native SDK configuration and an overview of the Momentics IDE, the book is fast-paced and you will rapidly learn many of the best practices and techniques required for developing beautiful BlackBerry 10 apps. Learn BlackBerry 10 App Development is written for developers wishing to learn how to write apps for the new BlackBerry 10 OS and those interested in porting existing iOS and Android apps to BlackBerry 10 as native applications
    Pages: Online-Ressource (XVI, 356 pages) , 104 illustrations
    ISBN: 9781430261582
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer programming ; Computer Science ; Programming Techniques
    Description / Table of Contents: The number of Android devices running on Intel processors has increased since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel processors can be found in Android smartphones and tablets made by some of the top manufacturers of Android devices, such as Samsung, Lenovo, and Asus. The increase in Android devices featuring Intel processors has created a demand for Android applications optimized for Intel Architecture: Android Application Development for the Intel® Platform is the perfect introduction for software engineers and mobile app developers. Through well-designed app samples, code samples and case studies, the book teaches Android application development based on the Intel platform—including for smartphones, tablets, and embedded devices—covering performance tuning, debugging and optimization. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University
    Pages: Online-Ressource (XX, 520 pages) , 278 illustrations
    ISBN: 9781484201008
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Optimizing HPC Applications with Intel® Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve the ultimate goal of high performance at low power consumption on enterprise-class workstations and compute clusters. The book focuses on optimization for clusters consisting of the Intel® Xeon processor, but the optimization methodologies also apply to the Intel® Xeon Phi™ coprocessor and heterogeneous clusters mixing both architectures. Besides the tutorial and reference content, the authors address and refute many myths and misconceptions surrounding the topic. The text is augmented and enriched by descriptions of real-life situations
    Pages: Online-Ressource (XXIV, 300 pages) , 74 illustrations
    ISBN: 9781430264972
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migration details are included. Cloud technology is a tremendous opportunity for an organization to reduce IT costs, and to improve productivity with increased access, simpler administration and improved services. Those businesses that embrace the advantages of the cloud will receive huge rewards in productivity and lower total cost of ownership over those businesses that choose to ignore it. The challenge for those charged with implementing Microsoft Office 365 is to leverage these advantages with the minimal disruption of their organization. This book provides practical help in moving your business to the Cloud and covers the planning, migration and the follow on management of the Office 365 Cloud services
    Pages: Online-Ressource (XXIX, 680 pages) , 638 illustrations
    ISBN: 9781430265276
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Keywords: Computer science ; Multimedia information systems ; Computer Science ; Computer Science, general ; Multimedia Information Systems
    Description / Table of Contents: Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods and metrics of digital video coding, so that readers have sufficient understanding to choose and tune coding parameters for optimum results that would suit their particular needs for quality, compression, speed and power. The practical aspects are many: Uploading video to the Internet is only the beginning of a trend where a consumer controls video quality and speed by trading off various other factors. Open source and proprietary applications such as video e-mail, private party content generation, editing and archiving, and cloud asset management would give further control to the end-user. Digital video is frequently compressed and coded for easier storage and transmission. This process involves visual quality loss due to typical data compression techniques and requires use of high performance computing systems. A careful balance between the amount of compression, the visual quality loss and the coding speed is necessary to keep the total system cost down, while delivering a good user experience for various video applications. At the same time, power consumption optimizations are also essential to get the job done on inexpensive consumer platforms. Trade-offs can be made among these factors, and relevant considerations are particularly important in resource-constrained low power devices. To better understand the trade-offs this book discusses a comprehensive set of engineering principles, strategies, methods and metrics. It also exposes readers to approaches on how to differentiate and rank video coding solutions
    Pages: Online-Ressource (XVII, 368 pages) , 115 illustrations
    ISBN: 9781430267133
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; User interfaces (Computer systems) ; Computer Science ; User Interfaces and Human Computer Interaction ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: GUI Design for Android Apps is the perfect—and concise—introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University, and is excerpted from Android Application Development for the Intel® Platform
    Pages: Online-Ressource (XI, 156 pages) , 65 illustrations
    ISBN: 9781484203828
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Software Engineering/Programming and Operating Systems ; Data Encryption
    Description / Table of Contents: It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track. --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI
    Pages: Online-Ressource (XXXVI, 400 pages) , 104 illustrations
    ISBN: 9781430263562
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...