ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Bücher  (39)
  • Computers and Society  (12)
  • Data encryption (Computer science)  (12)
  • Computer Science, general  (11)
  • Digital Humanities
  • Informatik  (39)
  • Technik allgemein  (4)
  • 1
    Schlagwort(e): Computer science ; Computer communication systems ; Special purpose computers ; Data encryption (Computer science) ; Computer Science ; Security ; Information Systems Applications (incl. Internet) ; Data Encryption ; Special Purpose and Application-Based Systems ; Computer Communication Networks
    Beschreibung / Inhaltsverzeichnis: Security of distributed interconnected systems --- Security of software systems --- Security of the Internet of Things
    Seiten: Online-Ressource (XII, 159 pages) , 33 illustrations
    ISBN: 9783319951898
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Schlagwort(e): Computer science ; Computer communication systems ; Computer system failures ; Computer security ; Data structures (Computer science) ; Computers and civilization ; Computer Science ; Computer Communication Networks ; Systems and Data Security ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation ; Computers and Society ; Information Systems Applications (incl. Internet)
    Beschreibung / Inhaltsverzeichnis: Making Flow-Based Security Detection Parallel --- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts --- Achieving Reproducible Network Environments with INSALATA --- Towards a Software-Defined Security Framework for Supporting Distributed Cloud --- Optimal Service Function Chain Composition in Network Functions Virtualization --- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services --- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications --- Towards Internet Scale Quality-of-Experience Measurement with Twitter --- Hunting SIP Authentication Attacks Efficiently --- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks --- Flow-Based Detection of IPv6-specific Network Layer Attacks --- Towards a Hybrid Cloud Platform Using Apache Mesos --- Visual Analytics for Network Security and Critical Infrastructures --- Preserving Relations in Parallel Flow Data Processing --- SmartDEMAP: A Smart Contract Deployment and Management Platform --- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads --- Situational Awareness: Detecting Critical Dependencies and Devices in a Network --- A Framework for SFC Integrity in NFV Environments --- Multi-domain DDoS Mitigation based on Blockchains
    Seiten: Online-Ressource (XX, 192 pages) , 55 illustrations
    ISBN: 9783319607740
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Schlagwort(e): Computer science ; Research ; Moral and ethical aspects ; Computers ; Computers and civilization ; Computer Science ; Computers and Society ; History of Computing ; Diversity Management/Women in Business ; Research Ethics
    Beschreibung / Inhaltsverzeichnis: Shifting Identities in Computing: From a Useful Tool to a New Method and Theory of Science --- On the Big Impact of “Big Computer Science” --- On Informatics, Diamonds and T --- Leadership and Balance in Research --- Rational ethics --- Ethics for the digital age: where are the moral specs? --- Digital Sovereignty and IT-Security for a Prosperous Society --- Women in Computing and the contingency of informatics cultures --- Ada - poet of computing
    Seiten: Online-Ressource (XI, 109 pages) , 22 illustrations in color
    ISBN: 9783319557359
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Unbekannt
    Berlin, Heidelberg : Springer Vieweg
    Schlagwort(e): Engineering ; Humanities ; Digital libraries ; Computers ; Educational technology ; Electrical engineering ; Engineering ; Communications Engineering, Networks ; Information Systems and Communication Service ; Digital Humanities ; Technology and Digital Education
    Beschreibung / Inhaltsverzeichnis: Seit Jahren wird unser Alltag geprägt von zunehmender Automation und Vernetzung, die Digitalisierung genannt wird. Sensoren erfassen immer mehr unterschiedliche Daten und werden von intelligenten Algorithmen zunehmend präzisier analysiert. Dies führt nicht nur zu einem anderen Verhältnis im Umgang und bei der Nutzung von Daten durch Menschen und Maschinen, sondern wird auch dramatisch Aufgaben und Prozesse verändern. Die damit verbundenen Arbeitsanforderungen werden zum massiven Wandel von Berufsbildern führen, in dem einfache Tätigkeiten automatisiert und komplexe Tätigkeiten vereinfacht werden. Nicht nur das Arbeiten sondern auch das Lernen, Lehren und Forschen verändert sich durch die Digitalisierung. Die technischen Möglichkeiten wandeln die Lebenswelten mit ihren urbanen Versorgungs- und Infrastrukturen und eröffnen den Wirtschaftsräumen neue Geschäftsmodelle. Diese parallel einsetzenden Entwicklungen führen zu radikalen Umbrüchen, die in den kommenden Jahren sämtliche Aspekte der Gesellschaft verändern werden
    Seiten: Online-Ressource (IX, 199 Seiten)
    ISBN: 9783662528549
    Sprache: Deutsch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Unbekannt
    Berlin, Heidelberg : Springer Vieweg
    Schlagwort(e): Engineering ; Humanities ; Digital libraries ; Educational technology ; Electrical engineering ; Engineering ; Communications Engineering, Networks ; Digital Humanities ; Technology and Digital Education
    Beschreibung / Inhaltsverzeichnis: Vorwort --- Einleitung --- Bürger --- Wenn Bots sich unter Leute mischen: Social Bots in den Sozialen Medien --- Digitale Partizipation in Wissenschaft und Wirtschaft --- Entwicklung einer soziodigitalen Souveränität --- Unternehmen --- Digitale Souveränität – ein mehrdimensionales Handlungskonzept für die deutsche Wirtschaft --- Privatheit und digitale Souveränität in der Arbeitswelt 4.0 --- Staat --- Mehr Daten, weniger Vertrauen in Statistik – freie Fahrt für ‚alternative Fakten‘? --- Internationale Perspektiven auf digitale Souveränität --- Digitalisierung der Bildung als staatliche Aufgabe --- Ausblick
    Seiten: Online-Ressource (IX, 187 Seiten) , 40 Abbildungen in Farbe
    ISBN: 9783662557969
    Sprache: Deutsch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Unbekannt
    Berlin, Heidelberg : Springer Vieweg
    Schlagwort(e): Engineering ; Humanities ; Digital libraries ; Computers ; Educational technology ; Electrical engineering ; Engineering ; Communications Engineering, Networks ; Information Systems and Communication Service ; Digital Humanities ; Technology and Digital Education
    Beschreibung / Inhaltsverzeichnis: Seit Jahren wird unser Alltag geprägt von zunehmender Automation und Vernetzung, die Digitalisierung genannt wird. Sensoren erfassen immer mehr unterschiedliche Daten und werden von intelligenten Algorithmen zunehmend präzisier analysiert. Dies führt nicht nur zu einem anderen Verhältnis im Umgang und bei der Nutzung von Daten durch Menschen und Maschinen, sondern wird auch dramatisch Aufgaben und Prozesse verändern. Die damit verbundenen Arbeitsanforderungen werden zum massiven Wandel von Berufsbildern führen, in dem einfache Tätigkeiten automatisiert und komplexe Tätigkeiten vereinfacht werden. Nicht nur das Arbeiten sondern auch das Lernen, Lehren und Forschen verändert sich durch die Digitalisierung. Die technischen Möglichkeiten wandeln die Lebenswelten mit ihren urbanen Versorgungs- und Infrastrukturen und eröffnen den Wirtschaftsräumen neue Geschäftsmodelle. Diese parallel einsetzenden Entwicklungen führen zu radikalen Umbrüchen, die in den kommenden Jahren sämtliche Aspekte der Gesellschaft verändern werden
    Seiten: Online-Ressource (IX, 199 Seiten)
    ISBN: 9783662528549
    Sprache: Deutsch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Unbekannt
    Berlin, Heidelberg : Springer Vieweg
    Schlagwort(e): Engineering ; Humanities ; Digital libraries ; Educational technology ; Electrical engineering ; Engineering ; Communications Engineering, Networks ; Digital Humanities ; Technology and Digital Education
    Beschreibung / Inhaltsverzeichnis: Vorwort --- Einleitung --- Bürger --- Wenn Bots sich unter Leute mischen: Social Bots in den Sozialen Medien --- Digitale Partizipation in Wissenschaft und Wirtschaft --- Entwicklung einer soziodigitalen Souveränität --- Unternehmen --- Digitale Souveränität – ein mehrdimensionales Handlungskonzept für die deutsche Wirtschaft --- Privatheit und digitale Souveränität in der Arbeitswelt 4.0 --- Staat --- Mehr Daten, weniger Vertrauen in Statistik – freie Fahrt für ‚alternative Fakten‘? --- Internationale Perspektiven auf digitale Souveränität --- Digitalisierung der Bildung als staatliche Aufgabe --- Ausblick
    Seiten: Online-Ressource (IX, 187 Seiten) , 40 Abbildungen in Farbe
    ISBN: 9783662557969
    Sprache: Deutsch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Schlagwort(e): Computer science ; User interfaces (Computer systems) ; Application software ; Computers ; Computers and civilization ; Computer Science ; History of Computing ; User Interfaces and Human Computer Interaction ; Computer Appl. in Arts and Humanities ; Computers and Society
    Beschreibung / Inhaltsverzeichnis: Once Neglected, Now Emerging and Absolutely Necessary: On the History of Digital Humanities or An Introduction --- Why Oral History? ---  ‘Individuation is There in all the Different Strata:’ an Oral History Conversation between John Burrows, Hugh Craig and Willard McCarty --- ‘It was a Time When the University was Still Taking Account of the Meaning of universitas scientiarum’: an Oral History Conversation between Wilhelm Ott and Julianne Nyhan --- ‘hic Rhodus, hic salta’: An Oral History Interview Between Tito Orlandi and Julianne Nyhan --- ‘They Took a Chance’: An Oral History Conversation between Susan Hockey and Julianne Nyhan ---  ‘And Here We go Back Again to the Influence of Algorithmic Thinking’: An Oral History conversation between Judy Malloy and Julianne Nyhan --- ‘I Would Think of Myself as Sitting Inside the Computer, Moving Things Around in Order to Accomplish the Goal of my Programming’: An Oral History Conversation Between Mary Dee Harris and Julianne Nyhan --- ‘I Was Absolutely Convinced That There Had to be a Better Way’: An Oral History Conversation Between John Nitti and Julianne Nyhan --- ‘It’s a Little Mind-Boggling Actually’: An Oral History Conversation between Helen Agüera and Julianne Nyhan ---  ‘I Heard About the Arrival of the Computer’: An Oral History Conversation Between Hans Rutimann and Julianne Nyhan ---  ‘Langezeit habe ich der Universitaet nachgetrauert’: An Oral History Conversation between Michael Sperberg-McQueen and Julianne Nyhan.-‘It’s Probably the Only Modestly Widely used System with a Command Language in Latin’: An Oral History Conversation Between Manfred Thaller and Julianne Nyhan ---  ‘I was Keen on Getting Computers into Humanists’ Thinking’: An Oral History Conversation Between John Bradley and Julianne Nyhan ---  ‘Moderate Expectations, Tolerable Disappointments’: An Oral History Conversation between Claus Huitfeldt and Julianne Nyhan --- ‘So, Into the Chopper it Went’: An Oral History Conversation between Gabriel Egan and Julianne Nyhan --- Revolutionaries and Underdogs --- By Way of a Conclusion
    Seiten: Online-Ressource (XI, 285 pages)
    ISBN: 9783319201702
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Schlagwort(e): Computer science ; Management ; Industrial management ; Information storage and retrieval ; Application software ; Computers and civilization ; Computer Science ; Information Storage and Retrieval ; Innovation/Technology Management ; Computer Applications ; Computers and Society
    Beschreibung / Inhaltsverzeichnis: Part I: The Big Data Opportunity --- The Big Data Value Opportunity --- Introduction to the BIG Project --- Part II: The Big Data Value Chain: Enabling and Value Creating Technologies --- The Big Data Value Chain: Definitions, Concepts, and Theoretical Approaches --- Big Data Acquisition --- Big Data Analysis --- Big Data Curation --- Big Data Storage --- Big Data Usage --- Part III: Usage and Exploitation of Big Data --- Big Data Driven Innovation in Industrial Sectors --- Big Data in the Health Sector --- Big Data in the Public Sector --- Big Data in the Finance and Insurance Sectors --- Big Data in the Energy and Transport Sectors --- Big Data in the Media and Entertainment Sectors --- Part IV: A Roadmap for Big Data Research --- Cross-Sectorial Requirements Analysis for Big Data Research --- New Horizons for a Data-Driven Economy: Roadmaps and Action Plans for Technology, Businesses, Policy, and Society.                        
    Seiten: Online-Ressource (XX, 303 pages) , 34 illustrations
    ISBN: 9783319215693
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Computer Science ; Computer Science, general
    Beschreibung / Inhaltsverzeichnis: Chapter 1 Introduction --- Chapter 2 Misperception of Risk --- Chapter 3 Governance and Internal Partnerships --- Chapter 4 External Partnerships --- Chapter 5 People Are the Perimeter --- Chapter 6 Emerging Capabilities and Usage Models --- Chapter 7 A New Security Architecture to Improve Business Agility --- Chapter 8 Looking to the Future --- Chapter 9 Corporate Social Responsibility --- Chapter 10 The 21st Century CISO --- Chapter 11 Performance Coaching --- Appendix A: References.
    Seiten: Online-Ressource (XXVII, 187 pages) , 20 illustrations in color
    Ausgabe: 2nd edition
    ISBN: 9781484214558
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Beschreibung / Inhaltsverzeichnis: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Seiten: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Schlagwort(e): Computer science ; Microprogramming ; Computer Science ; Computer Science, general ; Control Structures and Microprogramming
    Beschreibung / Inhaltsverzeichnis: Embedded Firmware Solutions is the perfect introduction and daily-use field guide--for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel’s new firmware direction (including Quark coverage), showing how to integrate Intel® Architecture designs into their plans. Featuring hands-on examples and exercises using Open Source codebases, like Coreboot and EFI Development Kit (tianocore) and Chromebook, this is the first book that combines a timely and thorough overview of firmware solutions for the rapidly evolving embedded ecosystem with in-depth coverage of requirements and optimization
    Seiten: Online-Ressource (XXIII, 224 pages) , 68 illustrations
    ISBN: 9781484200704
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    Schlagwort(e): Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Beschreibung / Inhaltsverzeichnis: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Seiten: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Beschreibung / Inhaltsverzeichnis: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Seiten: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Beschreibung / Inhaltsverzeichnis: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Seiten: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Beschreibung / Inhaltsverzeichnis: Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine. It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work
    Seiten: Online-Ressource (XX, 272 pages) , 74 illustrations
    ISBN: 9781430265726
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Beschreibung / Inhaltsverzeichnis: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Seiten: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Schlagwort(e): Computer science ; Computer Science ; Computer Science, general
    Beschreibung / Inhaltsverzeichnis: Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team’s findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. His personal blog about programming is BytesThink (www.bytesthink.com)
    Seiten: Online-Ressource (XXII, 680 pages) , 256 illustrations
    ISBN: 9781430268383
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Computer Science ; Computer Science, general
    Beschreibung / Inhaltsverzeichnis: Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app’s UI, and C++/Qt for the application logic. No prior knowledge of C++ is assumed and the book covers the fundamental aspects of the language for writing BlackBerry 10 apps. Also a particular emphasis is put on how to create a visually enticing user experience with the Cascades framework, which is based on Qt and QML. Starting with the native SDK configuration and an overview of the Momentics IDE, the book is fast-paced and you will rapidly learn many of the best practices and techniques required for developing beautiful BlackBerry 10 apps. Learn BlackBerry 10 App Development is written for developers wishing to learn how to write apps for the new BlackBerry 10 OS and those interested in porting existing iOS and Android apps to BlackBerry 10 as native applications
    Seiten: Online-Ressource (XVI, 356 pages) , 104 illustrations
    ISBN: 9781430261582
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Beschreibung / Inhaltsverzeichnis: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Seiten: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 21
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Computer Science ; Computer Science, general
    Beschreibung / Inhaltsverzeichnis: Optimizing HPC Applications with Intel® Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve the ultimate goal of high performance at low power consumption on enterprise-class workstations and compute clusters. The book focuses on optimization for clusters consisting of the Intel® Xeon processor, but the optimization methodologies also apply to the Intel® Xeon Phi™ coprocessor and heterogeneous clusters mixing both architectures. Besides the tutorial and reference content, the authors address and refute many myths and misconceptions surrounding the topic. The text is augmented and enriched by descriptions of real-life situations
    Seiten: Online-Ressource (XXIV, 300 pages) , 74 illustrations
    ISBN: 9781430264972
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 22
    Schlagwort(e): Computer science ; Multimedia information systems ; Computer Science ; Computer Science, general ; Multimedia Information Systems
    Beschreibung / Inhaltsverzeichnis: Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods and metrics of digital video coding, so that readers have sufficient understanding to choose and tune coding parameters for optimum results that would suit their particular needs for quality, compression, speed and power. The practical aspects are many: Uploading video to the Internet is only the beginning of a trend where a consumer controls video quality and speed by trading off various other factors. Open source and proprietary applications such as video e-mail, private party content generation, editing and archiving, and cloud asset management would give further control to the end-user. Digital video is frequently compressed and coded for easier storage and transmission. This process involves visual quality loss due to typical data compression techniques and requires use of high performance computing systems. A careful balance between the amount of compression, the visual quality loss and the coding speed is necessary to keep the total system cost down, while delivering a good user experience for various video applications. At the same time, power consumption optimizations are also essential to get the job done on inexpensive consumer platforms. Trade-offs can be made among these factors, and relevant considerations are particularly important in resource-constrained low power devices. To better understand the trade-offs this book discusses a comprehensive set of engineering principles, strategies, methods and metrics. It also exposes readers to approaches on how to differentiate and rank video coding solutions
    Seiten: Online-Ressource (XVII, 368 pages) , 115 illustrations
    ISBN: 9781430267133
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 23
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Software Engineering/Programming and Operating Systems ; Data Encryption
    Beschreibung / Inhaltsverzeichnis: It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track. --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI
    Seiten: Online-Ressource (XXXVI, 400 pages) , 104 illustrations
    ISBN: 9781430263562
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 24
    Schlagwort(e): Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Information Storage and Retrieval ; Computers and Society
    Beschreibung / Inhaltsverzeichnis: Software Driven Networks, Virtualisation, Programmability and Autonomic Management --- Towards a Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet (SmartenIT) --- The NEBULA Future Internet Architecture --- Open the Way to Future Networks – A Viewpoint Framework from ITU-T --- Towards a Minimal Core for Information-Centric Networking --- Managing QoS for Future Internet Applications over Virtual Sensor Networks --- High Availability in the Future Internet --- Integrating OpenFlow in IMS Networks and Enabling for Future Internet Research and Experimentation --- Computing and Networking Clouds Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds --- Cloud–Based Evaluation Framework for Big Data --- Optimizing Service Ecosystems in the Cloud --- Resource Optimisation in IoT Cloud Systems by Using Matchmaking and Self-management Principles --- Towards a Secure Network Virtualization Architecture for the Future Internet --- Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures --- Internet of Things --- IoT6 – Moving to an IPv6-Based Future IoT --- SmartSantander: Internet of Things Research and Innovation through Citizen Participation --- A Cognitive Management Framework for Empowering the Internet of Things --- Building Modular Middlewares for the Internet of Things with OSGi --- Towards an Architecture for Future Internet Applications --- ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability --- Test-Enabled Architecture for IoT Service Creation and Provisioning --- Enabling Technologies and Economic Incentives Sustainable Wireless Broadband Access to the Future Internet --- The EARTH Project --- An Internet-Based Architecture Supporting Ubiquitous Application User Interfaces --- Cooperative Strategies for Power Saving in Multi-standard Wireless Devices --- Counting the Cost of FIRE: Overcoming Barriers to Sustainable Experimentation Facilities --- User Involvement in Future Internet Projects --- Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play --- Book Sponsoring Projects Overview 3DLife - Bringing the Media Internet to Life --- CONCORD Project Management of the Future Internet --- FLAMINGO NoE Project Management of the Future Internet --- The GEYSERS Concept and Major Outcomes --- iCore: A Cognitive Management Framework for the Internet of Things --- IoT6 Project in a Nutshell --- Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand --- The SmartenIT STREP Project: Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet --- The SmartSantander Project --- UniverSelf, Realizing Autonomics for Future Networks
    Seiten: Online-Ressource (XLIV, 369 pages) , 131 illustrations
    ISBN: 9783642380822
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 25
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Beschreibung / Inhaltsverzeichnis: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Seiten: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 26
    Schlagwort(e): Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Information Storage and Retrieval ; Computers and Society
    Beschreibung / Inhaltsverzeichnis: Software Driven Networks, Virtualisation, Programmability and Autonomic Management --- Towards a Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet (SmartenIT) --- The NEBULA Future Internet Architecture --- Open the Way to Future Networks – A Viewpoint Framework from ITU-T --- Towards a Minimal Core for Information-Centric Networking --- Managing QoS for Future Internet Applications over Virtual Sensor Networks --- High Availability in the Future Internet --- Integrating OpenFlow in IMS Networks and Enabling for Future Internet Research and Experimentation --- Computing and Networking Clouds Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds --- Cloud–Based Evaluation Framework for Big Data --- Optimizing Service Ecosystems in the Cloud --- Resource Optimisation in IoT Cloud Systems by Using Matchmaking and Self-management Principles --- Towards a Secure Network Virtualization Architecture for the Future Internet --- Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures --- Internet of Things --- IoT6 – Moving to an IPv6-Based Future IoT --- SmartSantander: Internet of Things Research and Innovation through Citizen Participation --- A Cognitive Management Framework for Empowering the Internet of Things --- Building Modular Middlewares for the Internet of Things with OSGi --- Towards an Architecture for Future Internet Applications --- ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability --- Test-Enabled Architecture for IoT Service Creation and Provisioning --- Enabling Technologies and Economic Incentives Sustainable Wireless Broadband Access to the Future Internet --- The EARTH Project --- An Internet-Based Architecture Supporting Ubiquitous Application User Interfaces --- Cooperative Strategies for Power Saving in Multi-standard Wireless Devices --- Counting the Cost of FIRE: Overcoming Barriers to Sustainable Experimentation Facilities --- User Involvement in Future Internet Projects --- Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play --- Book Sponsoring Projects Overview 3DLife - Bringing the Media Internet to Life --- CONCORD Project Management of the Future Internet --- FLAMINGO NoE Project Management of the Future Internet --- The GEYSERS Concept and Major Outcomes --- iCore: A Cognitive Management Framework for the Internet of Things --- IoT6 Project in a Nutshell --- Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand --- The SmartenIT STREP Project: Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet --- The SmartSantander Project --- UniverSelf, Realizing Autonomics for Future Networks
    Seiten: Online-Ressource (XLIV, 369 pages) , 131 illustrations
    ISBN: 9783642380822
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 27
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Computer organization ; Computer Science ; Computer Science, general ; Computer Systems Organization and Communication Networks
    Beschreibung / Inhaltsverzeichnis: Apress is proud to announce that Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources. Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - "chirps". Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. This must change. The architecture of the Internet of Things must evolve now by incorporating simpler protocols toward at the edges of the network, or remain forever inefficient. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored
    Seiten: Online-Ressource (XXVI, 192 pages) , 75 illustrations
    ISBN: 9781430257417
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 28
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Beschreibung / Inhaltsverzeichnis: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Seiten: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 29
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Computer Science ; Computer Science, general
    Beschreibung / Inhaltsverzeichnis: Android on x86: an Introduction to Optimizing for Intel® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel’s x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x86 devices. The fundamental idea is that extending your applications to support x86 or creating new ones is not difficult, but it is imperative to know all of the technicalities. This book is dedicated to providing you with an awareness of these nuances and an understanding of how to tackle them. Second, and most importantly, this book provides a one-stop detailed resource for best practices and procedures associated with the installation issues, hardware optimization issues, software requirements, programming tasks, and performance optimizations that emerge when developers consider the x86 Android devices. Optimization discussions dive into native code, hardware acceleration, and advanced profiling of multimedia applications. The authors have collected this information so that you can use the book as a guide for the specific requirements of each application project. This book is not dedicated solely to code; instead it is filled with the information you need in order to take advantage of x86 architecture. It will guide you through installing the Android SDK for Intel Architecture, help you understand the differences and similarities between processor architectures available in Android devices, teach you to create and port applications, debug existing x86 applications, offer solutions for NDK and C++ optimizations, and introduce the Intel Hardware Accelerated Execution Manager. This book provides the most useful information to help you get the job done quickly while utilizing best practices
    Seiten: Online-Ressource (XXVII, 380 pages) , 180 illustrations
    ISBN: 9781430261315
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 30
    Unbekannt
    Berkeley, CA : Apress
    Schlagwort(e): Computer science ; Computer Science ; Computer Science, general
    Beschreibung / Inhaltsverzeichnis: Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, wellness and environmental sensing.  It discusses the social, regulatory, and design considerations specific to these domains. The book provides an application-based approach using real-world examples to illustrate the application of sensor technologies in a practical and experiential manner. The book  guides the reader from the formulation of the research question, through the design and validation process, to the deployment and management phase of sensor applications.  The processes and examples used in the book are primarily based on research carried out by Intel or joint academic research programs. "Sensor Technologies: Healthcare, Wellness and Environmental Applications provides an extensive overview of sensing technologies and their applications in healthcare, wellness, and environmental monitoring. From sensor hardware to system applications and case studies, this book gives readers an in-depth understanding of the technologies and how they can be applied. I would highly recommend it to students or researchers who are interested in wireless sensing technologies and the associated applications." Dr. Benny Lo Lecturer, The Hamlyn Centre, Imperial College of London     "This timely addition to the literature on sensors covers the broad complexity of sensing, sensor types, and the vast range of existing and emerging applications in a very clearly written and accessible manner.  It is particularly good at capturing the exciting possibilities that will occur as sensor networks merge with cloud-based ‘big data’ analytics to provide a host of new applications that will impact directly on the individual in ways we cannot fully predict at present.  It really brings this home through the use of carefully chosen case studies that bring the overwhelming concept of 'big data' down to the personal level of individual life and health."   Dermot Diamond Director, National Centre for Sensor Research, Principal Investigator, CLARITY Centre for Sensor Web Technologies, Dublin City University                                                                      "Sensor Technologies: Healthcare, Wellness and Environmental Applications takes the reader on an end-to-end journey of sensor technologies, covering the fundamentals from an engineering perspective, introducing how the data gleaned can be both processed and visualized, in addition to offering exemplar case studies in a number of application domains.  It is a must-read for those studying any undergraduate course that involves sensor technologies.  It also provides a thorough foundation for those involved in the research and development of applied sensor systems.  I highly recommend it to any engineer who wishes to broaden their knowledge in this area!" Chris Nugent Professor of Biomedical Engineering, University of Ulster  
    Seiten: Online-Ressource (XXV, 336 pages) , 108 illustrations
    ISBN: 9781430260141
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 31
    Schlagwort(e): Computer science ; Computer Science ; Computer Science, general
    Beschreibung / Inhaltsverzeichnis: Intel® Xeon Phi™ Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It also examines the source code-level optimizations that can be performed to exploit the powerful features of the processor. Xeon Phi is at the heart of world’s fastest commercial supercomputer, which thanks to the massively parallel computing capabilities of Intel Xeon Phi processors coupled with Xeon Phi coprocessors attained 33.86 teraflops of benchmark performance in 2013. Extracting such stellar performance in real-world applications requires a sophisticated understanding of the complex interaction among hardware components, Xeon Phi cores, and the applications running on them. In this book, Rezaur Rahman, an Intel leader in the development of the Xeon Phi coprocessor and the optimization of its applications, presents and details all the features of Xeon Phi core design that are relevant to the practice of application developers, such as its vector units, hardware multithreading, cache hierarchy, and host-to-coprocessor communication channels. Building on this foundation, he shows developers how to solve real-world technical computing problems by selecting, deploying, and optimizing the available algorithms and data structure alternatives matching Xeon Phi’s hardware characteristics. From Rahman’s practical descriptions and extensive code examples, the reader will gain a working knowledge of the Xeon Phi vector instruction set and the Xeon Phi microarchitecture whereby cores execute 512-bit instruction streams in parallel
    Seiten: Online-Ressource (XXI, 232 pages)
    ISBN: 9781430259275
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 32
    Schlagwort(e): Computer science ; Data encryption (Computer science) ; Database management ; Computer Science ; Data Encryption ; Database Management
    Beschreibung / Inhaltsverzeichnis: This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!   John McAuley,EMC Corporation "This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud."   Alex Rodriguez,  Expedient Data Centers "This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk."   Pete Nicoletti. Virtustream Inc. Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server’s boot process to fit the datacenter’s requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. With a foreword from Albert Caballero, the CTO at Trapezoid
    Seiten: Online-Ressource (XVII, 156 pages) , 56 illustrations
    ISBN: 9781430261490
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 33
    Schlagwort(e): Computer science ; Computer Science ; Computer Science, general
    Beschreibung / Inhaltsverzeichnis: Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migration details are included. Cloud technology is a tremendous opportunity for an organization to reduce IT costs, and to improve productivity with increased access, simpler administration and improved services. Those businesses that embrace the advantages of the cloud will receive huge rewards in productivity and lower total cost of ownership over those businesses that choose to ignore it. The challenge for those charged with implementing Microsoft Office 365 is to leverage these advantages with the minimal disruption of their organization. This book provides practical help in moving your business to the Cloud and covers the planning, migration and the follow on management of the Office 365 Cloud services
    Seiten: Online-Ressource (XXIX, 680 pages) , 638 illustrations
    ISBN: 9781430265276
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 34
    Schlagwort(e): Computer science ; Computer communication systems ; Computers and civilization ; Management information systems ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Communications Engineering, Networks ; Computers and Society ; Management of Computing and Information Systems
    Beschreibung / Inhaltsverzeichnis: This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics.   Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed:   - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    Seiten: Online-Ressource (IX, 243 pages) , 61 illustrations
    ISBN: 9783642303821
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 35
    Schlagwort(e): Computer science ; Computer communication systems ; Data mining ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Data Mining and Knowledge Discovery ; Computers and Society
    Beschreibung / Inhaltsverzeichnis: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must. The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures
    Seiten: Online-Ressource (XXV, 252 pages)
    ISBN: 9783642302411
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 36
    Schlagwort(e): Computer science ; Computer communication systems ; Computers and civilization ; Management information systems ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Communications Engineering, Networks ; Computers and Society ; Management of Computing and Information Systems
    Beschreibung / Inhaltsverzeichnis: This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics.   Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed:   - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    Seiten: Online-Ressource (IX, 243 pages) , 61 illustrations
    ISBN: 9783642303821
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 37
    Schlagwort(e): Computer science ; Computer communication systems ; Data mining ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Data Mining and Knowledge Discovery ; Computers and Society
    Beschreibung / Inhaltsverzeichnis: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must. The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures
    Seiten: Online-Ressource (XXV, 252 pages)
    ISBN: 9783642302411
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 38
    Schlagwort(e): Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Information Storage and Retrieval ; Multimedia Information Systems ; Communications Engineering, Networks ; Computers and Society
    Beschreibung / Inhaltsverzeichnis: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will be a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.  This book is published in full compliance with the Open Access publishing initiative; it is based on the research carried out within the Future Internet Assembly (FIA). It contains a sample of representative results from the recent FIA meetings spanning a broad range of topics, all being of crucial importance for the future Internet.  The book includes 32 contributions and has been structured into the following sections, each of which is preceded by a short introduction: Foundations: architectural issues; socio-economic issues; security and trust; and experiments and experimental design. Future Internet Areas: networks, services, and content; and applications
    Seiten: Online-Ressource (XVI, 465 pages)
    ISBN: 9783642208980
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 39
    Schlagwort(e): Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Information Storage and Retrieval ; Multimedia Information Systems ; Communications Engineering, Networks ; Computers and Society
    Beschreibung / Inhaltsverzeichnis: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will be a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.  This book is published in full compliance with the Open Access publishing initiative; it is based on the research carried out within the Future Internet Assembly (FIA). It contains a sample of representative results from the recent FIA meetings spanning a broad range of topics, all being of crucial importance for the future Internet.  The book includes 32 contributions and has been structured into the following sections, each of which is preceded by a short introduction: Foundations: architectural issues; socio-economic issues; security and trust; and experiments and experimental design. Future Internet Areas: networks, services, and content; and applications
    Seiten: Online-Ressource (XVI, 465 pages)
    ISBN: 9783642208980
    Sprache: Englisch
    Standort Signatur Erwartet Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...