You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.
This book constitutes the refereed proceedings of the 45th Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2016, held in Cullinan, South Africa, in July 2016. The three revised full papers and 13 work-in-progress papers presented together with two invited keynote papers were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on assessment methods, instruction methods, new curricula, social skills, and various experiences.
"This book provides the latest empirical research and theoretical frameworks in the area of information security, presenting research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems"--Provided by publisher.
The three-volume set LNAI 3213, LNAI 3214, and LNAI 3215 constitutes the refereed proceedings of the 8th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2004, held in Wellington, New Zealand in September 2004.The over 450 papers presented were carefully reviewed and selected from numerous submissions. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense; among the areas covered are artificial intelligence, computational intelligence, cognitive technologies, soft computing, data mining, knowledge processing, various new paradigms in biologically inspired computing, and applications in various domains like bioinformatics, finance, signal processing etc.
As one of the many by-products of Moore’s Law, personal computers have, in recent decades, become powerful enough to record real-time eye movements with video-based eye trackers. The decrease in the prices of eye tracking systems (ETSs) has been accelerating since the 1990s, and their use in a variety of scientific domains expanding. ETSs and related applications have shown a lot of promise in recent years, and their widespread and ever-increasing use in mainstream/personal equipment for daily life has transformed them from a novelty into a relatively common tool. This book showcases the state of the art in current eye tracking research by bringing together work from a wide range of applic...
Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: In...
The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year’s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our s...
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research ...