Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Paradigms on Technology Development for Security Practitioners
  • Language: en
  • Pages: 520

Paradigms on Technology Development for Security Practitioners

None

Safety and Security Issues in Technical Infrastructures
  • Language: en
  • Pages: 499

Safety and Security Issues in Technical Infrastructures

  • Type: Book
  • -
  • Published: 2020-04-17
  • -
  • Publisher: IGI Global

In the modern age of urbanization, the mass population is becoming progressively reliant on technical infrastructures. These industrial buildings provide integral services to the general public including the delivery of energy, information and communication technologies, and maintenance of transport networks. The safety and security of these structures is crucial as new threats are continually emerging. Safety and Security Issues in Technical Infrastructures is a pivotal reference source that provides vital research on the modernization of occupational security and safety practices within information technology-driven buildings. While highlighting topics such as explosion process safety, nanotechnology, and infrastructural risk analysis, this publication explores current risks and uncertainties and the raising of comprehensive awareness for experts in this field. This book is ideally designed for security managers, safety personnel, civil engineers, architects, researchers, construction professionals, strategists, educators, material scientists, property owners, and students.

Large-Scale Scientific Computing
  • Language: en
  • Pages: 557

Large-Scale Scientific Computing

This book constitutes revised selected papers from the 13th International Conference on Large-Scale Scientific Computing, LSSC 23021, which was held in Sozopol, Bulgaria, during June 7-11, 2021. The 60 papers included in this book were carefully reviewed and selected from a total of 73 submissions. The volume also includes two invited talks in full paper length. The papers were organized in topical sections as follows: Fractional diffusion problems: numerical methods, algorithms and applications; large-scale models: numerical methods, parallel computations and applications; application of metaheuristics to large-scale problems; advanced discretizations and solvers for coupled systems of partial differential equations; optimal control of ODEs, PDEs and applications; tensor and matrix factorization for big-data analysis; machine learning and model order reduction for large scale predictive simulations; HPC and big data: algorithms and applications; and contributed papers.

Environmental Protection and Disaster Risks
  • Language: en
  • Pages: 376

Environmental Protection and Disaster Risks

This book presents topics that are challenging fields that scientific world is trying to address as much as it can. Earthquakes, floods, fires, droughts, blizzards, dust storms, natural releases of toxic gases and liquids, diseases, and other environmental variations affect hundreds of millions of people each year. Many disaster events are triggered by human activities. Dealing with these problems will require systems thinking and integrating multidisciplinary science. Actions in these directions are taken more and more in the recent years by political bodies, NGOs, and scientific groups trying to find sustainable solutions for the future generations. Every point of view matters when it come...

Research Anthology on Securing Medical Systems and Records
  • Language: en
  • Pages: 1060

Research Anthology on Securing Medical Systems and Records

  • Type: Book
  • -
  • Published: 2022-06-03
  • -
  • Publisher: IGI Global

With the influx of internet and mobile technology usage, many medical institutions—from doctor’s offices to hospitals—have implemented new online technologies for the storage and access of health data as well as the monitoring of patient health. Telehealth was particularly useful during the COVID-19 pandemic, which monumentally increased its everyday usage. However, this transition of health data has increased privacy risks, and cyber criminals and hackers may have increased access to patient personal data. Medical staff and administrations must remain up to date on the new technologies and methods in securing these medical systems and records. The Research Anthology on Securing Medica...

Issues on Risk Analysis for Critical Infrastructure Protection
  • Language: en
  • Pages: 256

Issues on Risk Analysis for Critical Infrastructure Protection

Critical infrastructure provides essential services to citizens. The mutual dependencies of services between systems form a complex “system of systems” with a large perturbation surface, prone to be damaged by natural and anthropic events. Their intrinsic and extrinsic vulnerabilities could be overcome by providing them adaptive properties to allow fast and effective recovery from loss of functionality. Resilience is thus the key issue, and its enhancement, at the systemic level, is a priority goal to be achieved. This volume reviews recent insights into the different domains (resilience-enhancing strategies, impact and threats knowledge, and dependency-related issues) and proposes new strategies for better critical infrastructure protection.

Cyber-Physical Security for Critical Infrastructures Protection
  • Language: en
  • Pages: 225

Cyber-Physical Security for Critical Infrastructures Protection

This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020. The 14 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: security threat intelligence; data anomaly detection: predict and prevent; computer vision and dataset for security; security management and governance; and impact propagation and power traffic analysis. The book contains 6 chapters which are available open access under a CC-BY license.

Computer Security. ESORICS 2023 International Workshops
  • Language: en
  • Pages: 785

Computer Security. ESORICS 2023 International Workshops

None

Computer Security. ESORICS 2022 International Workshops
  • Language: en
  • Pages: 715

Computer Security. ESORICS 2022 International Workshops

This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022. The 39 papers included in these proceedings stem from the following workshops: 8th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2022, which accepted 8 papers from 15 submissions; 6th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2022, which accepted 2 papers from 5 submissions; Second Workshop on Security, Privacy, Organizations, and Systems Engi...

Recent Advances in Computational Optimization
  • Language: en
  • Pages: 239

Recent Advances in Computational Optimization

  • Type: Book
  • -
  • Published: 2018-09-18
  • -
  • Publisher: Springer

Our everyday lives are practically unthinkable without optimization. We constantly try to minimize our effort and to maximize the reward or progress achieved. Many real-world and industrial problems arising in engineering, economics, medicine and other domains can be formulated as optimization tasks. This volume presents a comprehensive collection of extended contributions from the 2017 Workshop on Computational Optimization. Presenting recent advances in computational optimization, it addresses important concrete applications, e.g. the modeling of physical processes, wildfire modeling, modeling processes in chemical engineering, workforce planning, wireless access network topology, parameter settings for controlling various processes, berth allocation, identification of homogeneous domains, and quantum computing. The book shows how to develop algorithms for them based on new intelligent methods like evolutionary computations, ant colony optimization, constrain programming and others.