Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Robotic Sailing
  • Language: en
  • Pages: 203

Robotic Sailing

While sailing has a long tradition, both as a means of transportation and as a sport, robotic sailing is a fairly new area of research. One of its unique characteristics is the use of wind for propulsion. On the one hand, this allows for long range and long term autonomy. On the other hand, the dependency on changing winds presents a serious challenge for short and long term planning, collision avoidance, and boat control. Moreover, building a robust and seaworthy sailing robot is no simple task, leading to a truly interdisciplinary engineering problem. These proceedings summarize the state of the art as presented at the International Robotic Sailing Conference 2011. Following an overview of the history of autonomous sailing a number of recent boat designs is presented, ranging from small one-design boats to vessels built to cross the Atlantic Ocean. Subsequently, various aspects of system design and validation are discussed, further highlighting the interdisciplinary nature of the field. Finally, methods for collision avoidance, localization and route planning are covered.

Hardware Malware
  • Language: en
  • Pages: 103

Hardware Malware

In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the...

Hardware Hacking
  • Language: en
  • Pages: 448

Hardware Hacking

  • Type: Book
  • -
  • Published: 2004-01-29
  • -
  • Publisher: Elsevier

"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help" * An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire te...

Applied Cryptography and Network Security
  • Language: en
  • Pages: 476

Applied Cryptography and Network Security

None

Business Information Systems Workshops
  • Language: en
  • Pages: 344

Business Information Systems Workshops

  • Type: Book
  • -
  • Published: 2015-12-01
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the five workshops that were organized in conjunction with the International Conference on Business Information Systems, BIS 2015, which took place in Poznan, Poland, in June 2015. The 26 papers in this volume were carefully reviewed and selected from 56 submissions and were revised and extended after the event. The workshop topics covered knowledge-based business information systems (AKTB), business and IT alignment (BITA), transparency-enhancing technologies and privacy dashboards (PTDCS), semantics usage in enterprises (FSFE), and issues related to DBpedia. In addition two keynote papers are included in this book.

Digital-Forensics and Watermarking
  • Language: en
  • Pages: 626

Digital-Forensics and Watermarking

  • Type: Book
  • -
  • Published: 2015-06-24
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on forensics; watermarking; reversible data hiding; visual cryptography; and steganography and steganalysis.

Security Engineering and Intelligence Informatics
  • Language: en
  • Pages: 479

Security Engineering and Intelligence Informatics

  • Type: Book
  • -
  • Published: 2013-08-13
  • -
  • Publisher: Springer

This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.

Blocks and Chains
  • Language: en
  • Pages: 109

Blocks and Chains

The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities. These communities are very diverse and amongst others include: technical enthusiasts, activist groups, researchers from various disciplines, start ups, large enterprises, public authorities, banks, financial regulators, business men, investors, and also criminals. The scientific community adapted relatively slowly to this emerging and fast-moving field of cryptographic currencies and consensus ledgers. This was one reason that, for quite a while, the only resources available have been the Bitcoin source code, blog and forum...

Digital Nations – Smart Cities, Innovation, and Sustainability
  • Language: en
  • Pages: 540

Digital Nations – Smart Cities, Innovation, and Sustainability

  • Type: Book
  • -
  • Published: 2017-11-03
  • -
  • Publisher: Springer

This book constitutes the refereed conference proceedings of the 16th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2017, held in Delhi, India, in November 2017. The 45 revised full papers presented were carefully reviewed and selected from 92 submissions. They are organized in the following topical sections: Adoption of Smart Services; Assessment of ICT Enabled Smart Initiatives; Analytics for Smart Governance; Social Media and Web 3.0 for Smartness; and Smart Solutions for the Future.

RFID Security and Privacy
  • Language: en
  • Pages: 140

RFID Security and Privacy

As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.