You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents the most interesting talks given at ISSE 2005 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2005.
Dependable Network Computing provides insights into various problems facing millions of global users resulting from the `internet revolution'. It covers real-time problems involving software, servers, and large-scale storage systems with adaptive fault-tolerant routing and dynamic reconfiguration techniques. Also included is material on routing protocols, QoS, and dead- and live-lock free related issues. All chapters are written by leading specialists in their respective fields. Dependable Network Computing provides useful information for scientists, researchers, and application developers building networks based on commercially off-the-shelf components.
None
Machine learning and artificial intelligence are already widely applied to facilitate our daily lives, as well as scientific research, but with the world currently facing a global COVID-19 pandemic, their capacity to provide an important tool to support those searching for a way to combat the novel corona virus has never been more important. This book presents the proceedings of the International Conference on Machine Learning and Intelligent Systems (MLIS 2020), which was due to be held in Seoul, Korea, from 25-28 October 2020, but which was delivered as an online conference on the same dates due to COVID-19 restrictions. MLIS 2020 was the latest in a series of annual conferences that aim t...
During the last three decades of the twentieth century there has been widespread controversy over, and alteration of, gender roles in the United States. To a large extent the ferment originated in, and was influenced by, the general social upheaval of the sixties. A major result has been a well-publicized transformation in the options, social status, and perception of American women. But what affected women also affected men, and a similar movement among American males therefore accompanied the feminist movement. In Uneasy Males, Edward Gambill provides an historical overview of the American "men's movement". The book covers pro-feminist and anti-feminist responses, and the organization and activities of men's rights, father's rights, "mythopoetic", religious, and black male groups. While much of the focus is on the development and operation of formal organizations, there is also coverage of changes apart from these structures. Uneasy males thus provide readers with an understanding of, and thought-provoking question about, gender roles in the United States.
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived fro
This book constitutes extended, revised and selected papers from the 22nd International Conference on Enterprise Information Systems, ICEIS 2020, held online during May 5-7, 2020. The 41 papers presented in this volume were carefully reviewed and selected for inclusion in this book from a total of 255 submissions. They were organized in topical sections as follows: database and information systems integration; artificial intelligence and decision support systems; information systems analysis and specification; software agents and internet computing; human-computer interaction; and enterprise architecture.
This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the way we trust computers - Risk Management and how to quantify security threats - Awareness raising, Data Protection and how we secure corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2006.
Internet security continues to be one of the most talked about topics in the media today. This guide provides the most current, practical and actually useful security techniques in a comprehensive, easy-to-understand manner. It effectively portrays by example how to configure and maintain a computer and network against the security exposures of the Internet.