Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Trust, Privacy and Security in Digital Business
  • Language: en
  • Pages: 251

Trust, Privacy and Security in Digital Business

  • Type: Book
  • -
  • Published: 2017-08-11
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 14th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2017, held in Lyon, France, in August 2017 in conjunction with DEXA 2017. The 15 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are organized in the following topical sections: Privacy in Mobile Environments; Transparence and Privacy Enhancing Technologies; Security Measures; Cloud - IoT Security and Privacy; Security Awareness and Social Engineering - Policy Languages.

Availability, Reliability, and Security in Information Systems and HCI
  • Language: en
  • Pages: 520

Availability, Reliability, and Security in Information Systems and HCI

  • Type: Book
  • -
  • Published: 2013-08-19
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security, CD-ARES 2013, held in Regensburg, Germany, in September 2013. The 21 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: economic, ethical, legal, multilingual, organizational and social aspects; context-oriented information integration; data/information management as a service; context-oriented information integration and location-aware computing; security and privacy; risk management and business continuity; and security and privacy and location based applications. Also included are 15 papers from a special session on Human-Computer Interaction and Knowledge Discovery (HCI-KDD 2013).

Smart Grid Security
  • Language: en
  • Pages: 203

Smart Grid Security

  • Type: Book
  • -
  • Published: 2014-08-05
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Smart Grid Security, SmartGridSec 2014, held in Munich, Germany, in February 2014. The volume contains twelve corrected and extended papers presented at the workshop which have undergone two rounds of reviewing and improvement. The engineering, deployment and operation of the future Smart Grid will be an enormous project that will require the active participation of many stakeholders with different interests and views regarding the security and privacy goals, technologies, and solutions. There is an increasing need for workshops that bring together researchers from different communities, from academia and industry, to discuss open research topics in the area of future Smart Grid security.

Privacy Technologies and Policy
  • Language: en
  • Pages: 226

Privacy Technologies and Policy

  • Type: Book
  • -
  • Published: 2014-01-15
  • -
  • Publisher: Springer

This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.

Cyber-Risk Management
  • Language: en
  • Pages: 146

Cyber-Risk Management

  • Type: Book
  • -
  • Published: 2015-10-01
  • -
  • Publisher: Springer

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of...

Availability, Reliability, and Security in Information Systems
  • Language: en
  • Pages: 321

Availability, Reliability, and Security in Information Systems

  • Type: Book
  • -
  • Published: 2014-09-03
  • -
  • Publisher: Springer

This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.

Software Service and Application Engineering
  • Language: en
  • Pages: 195

Software Service and Application Engineering

  • Type: Book
  • -
  • Published: 2012-06-01
  • -
  • Publisher: Springer

This festschrift volume, published in honor of Bernd Krämer on the occasion of his 65th birthday, contains 11 contributions by close scientific companions. Covering topics like Petri nets and theoretical computer science, software and service engineering, cloud computing, and e-learning, the articles presented span the range of the scientific work of Bernd Krämer.

Transactions on Computational Science XIII
  • Language: en
  • Pages: 223

Transactions on Computational Science XIII

  • Type: Book
  • -
  • Published: 2011-08-31
  • -
  • Publisher: Springer

The 13th issue of the Transactions on Computational Science journal consists of two parts. The six papers in Part I span the areas of computing collision probability, digital image contour extraction, multiplicatively weighted Voronoi diagrams, multi-phase segmentation, the rough-set approach to incomplete information systems, and fault-tolerant systolic arrays for matrix multiplications. The five papers in Part II focus on neural-network-based trajectory prediction, privacy in vehicular ad-hoc networks, augmented reality for museum display and the consumer garment try-on experience, and geospatial knowledge discovery for crime analysis.

Smart Grid and Internet of Things
  • Language: en
  • Pages: 548

Smart Grid and Internet of Things

This volume, SGIoT 2020, constitutes the refereed proceedings of the 4th EAI International Conference on Smart Grid and Internet of Things, SGIoT 2020, held in TaiChung, Taiwan, in December 2020. The IoT-driven smart grid is currently a hot area of research boosted by the global need to improve electricity access, economic growth of emerging countries, and the worldwide power plant capacity additions. The 40 papers presented were reviewed and selected from 159 submissions and present broad range of topics in wireless sensor, vehicular ad hoc networks, security, blockchain, and deep learning.

Engineering Secure Software and Systems
  • Language: en
  • Pages: 241

Engineering Secure Software and Systems

  • Type: Book
  • -
  • Published: 2013-02-26
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.