You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge. Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.
New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce Informational Assurances Workflow Privacy Policy Modeling Mediation Information Warfare Defense Multilevel Security Role-based Access Controls Mobile Databases Inference Data Warehouses and Data Mining. This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece. Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development.
Although the animal may be, as Nietzsche argued, ahistorical, living completely in the present, it nonetheless plays a crucial role in human history. The fascination with animals that leads not only to a desire to observe and even live alongside them, but to capture or kill them, is found in all civilizations. The essays collected in Beastly Natures show how animals have been brought into human culture, literally helping to build our societies (as domesticated animals have done) or contributing, often in problematic ways, to our concept of the wild. The book begins with a group of essays that approach the historical relevance of human-animal relations seen from the perspectives of various di...
None
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference.
This text reviews the fundamental theory and latest methods for including contextual information in fusion process design and implementation. Chapters are contributed by the foremost international experts, spanning numerous developments and applications. The book highlights high- and low-level information fusion problems, performance evaluation under highly demanding conditions, and design principles. A particular focus is placed on approaches that integrate research from different communities, emphasizing the benefit of combining different techniques to overcome the limitations of a single perspective. Features: introduces the terminology and core elements in information fusion and context; presents key themes for context-enhanced information fusion; discusses design issues in developing context-aware fusion systems; provides mathematical grounds for modeling the contextual influences in representative fusion problems; describes the fusion of hard and soft data; reviews a diverse range of applications.
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.
Full text of Digital Copyright Act with legislative history, associated case law and other materials relevant to the subject.
This volume constitutes revised and selected papers presented at the First International Conference on Digital Transformation, Cyber Security and Resilience, DIGILIENCE 2020, held in Varna, Bulgaria, in September - October 2020. The 17 papers presented were carefully reviewed and selected from the 119 submissions. They are organized in the topical sections as follows: cyber situational awareness, information sharing and collaboration; protecting critical infrastructures and essential services from cyberattacks; big data and artificial intelligence for cybersecurity; advanced ICT security solutions; education and training for cyber resilience; ICT governance and management for digital transformation.
This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest.