Understanding High-Dimensional Spaces
ISBN: 9783642333972 / Angielski / Miękka / 108 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. High-dimensional spaces arise as a way of modelling datasets with many attributes. Such a dataset can be directly represented in a space spanned by its attributes, with each record represented as a point in the space with its position depending on its attribute values. Such spaces are not easy to work with because of their high dimensionality: our intuition about space is not reliable, and measures such as distance do not provide as clear information as we might expect. There are three main areas where complex high dimensionality and large datasets arise naturally: data collected by... High-dimensional spaces arise as a way of modelling datasets with many attributes. Such a dataset can be directly represented in a space spanned by... |
|
cena:
194,52 zł |
Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure
ISBN: 9781597499583 / Angielski / Miękka / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including:
Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills... |
|
cena:
177,65 zł |
Information Security Management Handbook, Volume 7
ISBN: 9781466567498 / Angielski / Twarda / 434 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference a... |
|
cena:
710,82 zł |
Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings
ISBN: 9783642342653 / Angielski / Miękka / 309 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.
This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in B...
|
|
cena:
194,52 zł |
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues
ISBN: 9781439883242 / Angielski / Twarda / 646 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-t... |
|
cena:
710,82 zł |
Community Policing in Indigenous Communities
ISBN: 9781439888940 / Angielski / Twarda / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Indigenous communities are typically those that challenge the laws of the nation states of which they have become often very reluctantly a part. Around the world, community policing has emerged in many of these regions as a product of their physical environments and cultures. Through a series of case studies, Community Policing in Indigenous Communities explores how these often deeply divided societies operate under the community policing paradigm. Indigenous communities are typically those that challenge the laws of the nation states of which they have become often very reluctantly a part. Ar... |
|
cena:
507,68 zł |
Authentication and Authorization on the Web
ISBN: 9780956737052 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A short book in the "Web Security Topics" series for Web developers, by the well-known authors Nigel and Jenny Chapman. Web applications manipulate resources in response to requests from users. It is often necessary to determine whether a requested operation should be allowed for the user who sent the request. This process of authorization - that is, deciding whether an application should be allowed to carry.out the operation which a request from a particular user or program calls for - depends on, but is separate from, the process of authentication. Authentication means determining the...
A short book in the "Web Security Topics" series for Web developers, by the well-known authors Nigel and Jenny Chapman. Web applications manipulate re...
|
|
cena:
80,52 zł |
The Complete Book of Data Anonymization: From Planning to Implementation
ISBN: 9781439877302 / Angielski / Twarda / 267 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data anonymization. It examines data anonymization from both a practitioner's and a program sponsor's perspective. Discussing analysis, planning, setup, and governance, it illustrates the entire process of adapting and implementing anonymization tools and programs. The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection usi... |
|
cena:
380,74 zł |
Human Behavior Recognition Technologies: Intelligent Applications for Monitoring and Security
ISBN: 9781466636828 / Angielski / Twarda / 380 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Recently, the ICT field has seen a shift from machine-centered focuses to human and user knowledge-based approaches. However, as priorities shift, questions arise on how to detect and monitor users behavior. Human Behavior Recognition Technologies: Intelligent Applications for Monitoring and Security takes an insightful look into the applications and dependability of behavior detection. In addition, this comprehensive publication looks into the social, ethical, and legal implications of these areas. Researchers and practitioners interested in the computational aspects of behavior monitoring...
Recently, the ICT field has seen a shift from machine-centered focuses to human and user knowledge-based approaches. However, as priorities shift, que...
|
|
cena:
1097,44 zł |
Advanced Statistical Steganalysis
ISBN: 9783642264504 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the first book dedicated to modern steganography and steganalysis. The author offers a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers.
This is the first book dedicated to modern steganography and steganalysis. The author offers a proposal to structure approaches to provably secure ste...
|
|
cena:
583,65 zł |
Counter Terrorism Issues: Case Studies in the Courtroom
ISBN: 9781466571921 / Angielski / Twarda / 266 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The American legal profession and judicial system bear a unique responsibility to set and maintain the balance between defending homeland security and protecting the civil liberties outlined in the Bill of Rights. These competing interests will continue to collide as the threats to our safety grow. Exploring the most significant terrorist cases of the past two decades, Counter Terrorism Issues: Case Studies in the Courtroom presents a panoramic view of the American judiciary s handling of domestic terrorism in the last 20 years. Drawing... The American legal profession and judicial system bear a unique responsibility to set and maintain the balance between defending homeland security ... |
|
cena:
533,12 zł |
Resilient Thinking: Protecting Organisations in the 21st Century
ISBN: 9781849283823 / Angielski / Miękka / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In Resilient Thinking, Phillip Wood discusses the importance of thinking laterally about potential impacts on your organisation and examines a 'thinking' approach to resilience management. Resilient Thinking will revolutionise your approach to risk analysis and crisis management. Even if the worst does happen, you will be fully equipped
In Resilient Thinking, Phillip Wood discusses the importance of thinking laterally about potential impacts on your organisation and examines a 'thinki...
|
|
cena:
141,94 zł |
Regulating Privacy: Data Protection and Public Policy in Europe and the United States
ISBN: 9780801480102 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The information revolution has brought with it the technology for easily collecting personal information about individuals, a facility that inherently threatens personal privacy. Colin J. Bennett here examines political responses to the data protection issue in four Western democracies, comparing legislation that the United States, Britain...
The information revolution has brought with it the technology for easily collecting personal information about individuals, a facility that inherently...
|
|
cena:
228,48 zł |
Computer Applications for Security, Control and System Engineering: International Conferences, Sectech, Ca, Ces3 2012, Held in Conjunction with Gst 20
ISBN: 9783642352638 / Angielski / Miękka / 492 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication,...
This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 20...
|
|
cena:
194,52 zł |
iNetSec 2009 - Open Research Problems in Network Security: IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers
ISBN: 9783642261053 / Angielski / Miękka / 169 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular,as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a...
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a ...
|
|
cena:
194,52 zł |
Smartdata: Privacy Meets Evolutionary Robotics
ISBN: 9781461464082 / Angielski / Twarda / 214 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. SmartData empowers personal data by wrapping it in a cloak of intelligence such that it now becomes the individual's virtual proxy in cyberspace. No longer will personal data be shared or stored in the cloud as merely data, encrypted or otherwise; it will now be stored and shared as a constituent of the binary string specifying the entire SmartData agent. This agent proactively builds-in privacy, security and user preferences, right from the outset, not as an afterthought. SmartData: Privacy Meets Evolutionary Robotics includes the advances made in the technology of simulating virtual...
SmartData empowers personal data by wrapping it in a cloak of intelligence such that it now becomes the individual's virtual proxy in cyberspace. No l...
|
|
cena:
583,65 zł |
E-Business and Telecommunications: International Joint Conference, Icete 2011, Seville, Spain, July 18-21, 2011. Revised Selected Papers
ISBN: 9783642357541 / Angielski / Miękka / 536 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Joint Conference on E-Business and Telecommunications, ICETE 2011, held in Seville, Spain in July 2011. The 118 revised full papers presented were carefully reviewed and selected from 409 submissions. The topics covered are data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component conferences, namely: DCNET, ICE-B, OPTICS,...
This book constitutes the refereed proceedings of the 8th International Joint Conference on E-Business and Telecommunications, ICETE 2011, held in Sev...
|
|
cena:
194,52 zł |
Adaptive Cryptographic Access Control
ISBN: 9781461426424 / Angielski / Miękka / 138 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential. The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control... Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct... |
|
cena:
389,09 zł |
When Technocultures Collide: Innovation from Below and the Struggle for Autonomy
ISBN: 9781554588978 / Angielski / Miękka / 222 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When Technocultures Collide provides rich and diverse studies of collision courses between technologically inspired subcultures and the corporate and governmental entities they seek to undermine. The adventures and exploits of computer hackers, phone phreaks, urban explorers, calculator and computer collectors, "CrackBerry" users, whistle-blowers, Yippies, zinsters, roulette cheats, chess geeks, and a range of losers and tinkerers feature prominently in this volume. Gary Genosko analyzes these practices for their remarkable diversity and their innovation and leaps of imagination. He assesses...
When Technocultures Collide provides rich and diverse studies of collision courses between technologically inspired subcultures and the corporate and ...
|
|
cena:
105,75 zł |
Active Directory Cookbook: Solutions for Administrators & Developers
ISBN: 9781449361426 / Angielski / Miękka / 860 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft's network directory service. This fourth edition includes troubleshooting recipes for Windows Server 2012, Windows 8, and Exchange 2013, based on valuable input from Windows administrators. You'll also find quick solutions for the Lightweight Directory Access Protocol (LDAP), Active Directory... Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this p... |
|
cena:
253,85 zł |