Search results 273
Paper図書
National Diet Library
- Subject HeadingComputer security Information technology--Security measures Computer security. Information technology--Security measures.
- Title HeadingAdvanced sciences and technologies for security applications, 1613-5113
Paper図書
National Diet LibraryOther Libraries in Japan
- Summary, etc.This book explores and analyzes the r......in diplomatic, information, military, and economic secto......sity labs, the technology sector, and military resea......people, ideas, and technology that in turn a......-cost weapons, and dual-use techn......hanging global security landscape. Innovative and dual-use techn......ilitary powers and non-state acto......hreaten global security and stability. As ......al regulations and security arrangements m......eeks to assess and present policy......ion of weapons and dual-use technology
- Contents...o Manipulation and Fraudulent Simulation Technology Using Simple A......tations of GPS and the Need for R......g, Navigation, and Timing (PNT) 4......he African Bush: Security Ramifications ......5. Development and Proliferation of Flexible and Wearable Electronics: Opportunities and Challenges for National Security 6. Potential T......vances in Neurotechnology 7. Exploring t...... Proliferation and Autonomy of Sm......aft Systems on Security 9 Chemical Def......nse Urban Areas: How Urbanization and Proliferation ......ns on National Security
- Subject HeadingSecurity, International......Armes weapons. Security, International. Technological...
Paper図書
National Diet Library
- Summary, etc....uting hardware and software, and data encryption, and the widespread......ata processing and electronic bus......ng increase in information security threats. The l......st advances in information security have increased......al deployments and scalability ac...... wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. T......ging trends in information security from the foundations and technologies i......ometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer fore......rnet of Things security, and network security. Inform...
- ContentsIntroduction to information security foundations and applications / Ali Ismail Awad Information security foundation, theories and future vision ......Steven Furnell Information systems security issues in the ......ms, modalities and attacks / Nath......ealthcare cybersecurity / Jemal H. Abawajy Security challenges and solutions for ......g Li, Godwin Obande Recent security issues in Big Data: from past to the future of information systems / Juli......relli Hardware security: side-channel attacks and hardware Troja......ea Ismail Cybersecurity: timeline malware analysis and classification......identification and continuous authentication / M...
- Subject HeadingComputer security Security systems Data protection Security systems. Data ......tion. Computer security.
Paper図書
National Diet Library
- Summary, etc.This handbook is a selec......ional aspects, security analysis, platforms, and applications of blockchain......uted computing and cryptography. ......tal signatures and commitment sch......g, verifiable random functions th......acy-preserving and secure design ...... part of this handbook consists o......kchain designs and platforms. Arc......ro, Tendermint and Algorand have been pres......ke scalability and security are discussed ......he third part. Security design challenges, security vulnerabilities and their analysis...... part of this handbook discusses various applications of blockchain......hain, identity and credential management, Intern...
- Contents...ockchain System: An Overview of Security and Privacy Aspect......reum Blockchain: Implementation and Security Aspects The Fu......lockchain Algorand Blockchain Tendermint The Security of Delegated P......f Stake Wallet and Stake Pools La...... Consequences, and Remedies Block......ed Distributed and Secure Digital......ain Blockchain Technology for E-Governance Applications When Blockcha......ts Smart Cities: Opportunities, Security and Future Researc......ity Management and Blockchains: Design Patterns and Architectures ......ing Blockchain Technology Accelerating Industry 4.0 Blo...
- Subject Heading...s)--Industrial applications Chaînes de b......̂nes de blocs--Applications industrielles
Paper図書
National Diet Library
- Subject Heading...itary science) Information resources management. Interag...
- Title HeadingAdvanced sciences and technologies for security applications.
Paper図書
National Diet Library
- Summary, etc.The COVID-19 pandemic is not onl...... to our health and economy, but a......ns for defence and security. Indeed, defen......-19, namely disinformation and preparing to f....... The current pandemic is a breed......pagation of disinformation, as it represe......distributor of information. This multi-na......ence, academia and industry, incl......States, Netherlands, Singapore, United Kingdom and Norway. The co......s from defence and security organizations, academics, and militaries inc......uding analysts and practitioners,......of COVID-19 disinformation, including ide......al dominant disinformation narratives and the methods us...
- Contents...nitive Warefare: NATO, COVID-19 and the Impact of Emerging and Disruptive Tec......ches to Detect and Mitigate COVID......ng COVID-19 Disinformation, Misinformation and Malinformation During the Pandemic Infodemic: A View from th......dom Web of Lies: Mapping the Na......tives, Effects and Amplifiers of ......an COVID-19 Disinformation The Asian COVI......VID Related Disinformation Are You Seeing......nce for Online Information Environment Assessments
- Subject HeadingDisinformation COVID-19 Pandemic, 2020- COVID-19 Pandemic, 2020- , i......edia COVID-19 Pandemic, 2020- , i......mass media. Disinformation.
Digital電子書籍・電子雑誌図書
National Diet Library
Paper図書
National Diet LibraryOther Libraries in Japan
- Summary, etc....rdware devices and software progr......ts of the topic: contextual iss......l use weapons, and the implicatio......ly by national security agencies and the military, ......w enforcement, and the business sector: the latter includes administr...
- Contents...n Human Nature and Cyber Weaponry : Use of Denial and Deception in C......Frank J. Stech and Kristen E. Hec...... Human Element : The "Trigger" ......fense for IMGs and NGOs Using Cri......a Fire Hydrant : Information Overload As a ......in Cyber Space : Methods to Ana......es Rule of Law : Controlling Cy......le Edged Sword : Dual Purpose Cyber Security Methods / Ange......t Masked Man?" : System Penetrations : Friend or Foe?......mas, Greg Low, and Oliver Burmeis......er Development and Proliferation ......apons in Cyber-Security / Trey Herr No Smoking Gun : Cyber Weapons and Drug Trafficke......nomous Weapons : Terminator-Esque Software Des...
- Subject HeadingComputer crimes. Computer security. Computer networks--Security measures. Cybe......ence (Computer security) Cyberspace operations (Milit...
Paper図書
National Diet LibraryOther Libraries in Japan
- Summary, etc.This handbook is organiz...... part of this handbook deals with multimedia security for emerging applications. The chapters......ltimedia tools and applications, biological and behavioral bio......dia encryption and secure waterma......s for emerging applications, an adaptive ......n approach for android mobile devices, and multimedia using chaotic and perceptual has...... part of this handbook focuses on......ious potential applications. The chapter ......ion techniques and role of de-noi......age processing and it applications, a segmentati......e enhancements and de-noising tec......s for emerging applications, improved performance of ima...
- Contents...t 1 Multimedia Security 1. Information to Multimedia Tools and Applications 2. An overvie...... Methods 3. SIE: An application to secure Ster......for Multimedia Security 6. A Secure Me......r E-Healthcare Applications 7. Hybrid Tra......atermarking 9. Security Biometric and Biomedical Ima......ltiple Chaotic and Hyper-Chaotic ......3. An Adaptive and Viable Face Id......tification for Android Mobile Dev......ces 15. Robust and Secure Hiding ......ion Techniques and Role of De-noising: A Technical Su......age Processing and its Applications 4. 3-D Shape ......7. Enhancement and De-noising of ...... with Teaching and Learning based Optimization A...
- Subject HeadingMultimedia systems. Computer security.
Paper図書
National Diet Library
- Note (General)Papers, discussions and presentations.
Paper図書
National Diet Library
- Genre/Form TermsConference papers and proceedings.
- Subject HeadingInformation technology--Congresses. C......)--Congresses. Information technology. ITCS
- Note (General)Papers. Volume 1: pages 1-538; volume 2: pages 539-1075...... Conference on Information Technology Convergence and Services (ITCS-13) and the 3rd Intern......on Facilities, and Applications (IRoA 2013) ..."--Page xiii.
Paper図書
National Diet Library
- Genre/Form TermsConference papers and proceedings.
- Subject Heading...sses. Infrared technology--Congresses. I......ment. Infrared technology. Quantum computing
- Alternative TitleElectro-optical and infrared systems: technology and applications 12; and quantum information science and technology : 22-23 September 2015 : Toulouse, France SPIE. security + defence
Paper図書
National Diet Library
- Summary, etc.This book has 14 Chapters: telemedicine d......mplementation, and evaluation; su......oring; medical information processing tec......ty social work and tele-mental health services; technology-enhanced socia...... work practice and education; adv......ping operators and viewing device......ence of colour and grey-scale HDR......n EEG features and subjective qua...... Things (IoMT) and healthcare del......r medical data security and medical data security and privacy; conclusion
- Contents...implementation and evaluation of ......Saravana Kumar and Esther Jie Tia......ies in medical information processing / H......mmed Dler Omer and Joan Lu A comp......ha Jeyaprakash and Geetha Subbiah......r telemedicine applications / Sandeep Raj Data mi......g (Bill) Tseng and Satya Akundi Social work and tele-mental he......ices for rural and remote communi......rdre Tedmanson and Sophie Diamandi Technology-enhanced socia...... work practice and education / Ka...... Renae Summers and Sophie Diamandi Advanced tele......ay Chakraborty and Bharat Gupta I......ping operators and viewing device......ence of colour and grey-scale HDR images / Shaym...
Paper図書
National Diet Library
- Genre/Form TermsConference papers and proceedings.
- Subject HeadingComputer security--Congresses. C......uter networks--Security measures--Cong......oud computing--Security measures--Congresses. Interne...
- Note (General)Abstracts and papers. IEEE catalog number C...
Paper図書
National Diet Library
- Summary, etc....ted components and full practical......ms engineering and risk management in security and defense operat......infrastructure and manpower contr...... design, space technology, satellites, i......listic missile and space security. While there a......ms engineering and risk managemen......ms engineering and risk managemen...... in the entire security and defense action......ms engineering and risk managemen......loped concepts and examples based on industry and government met...... for defeating and deactivating i......losive devices and land mines, and security measures again......rs in industry and government, and to serve as a...
- Contents...ainst national security Systems engineering and weapon systems......ent of Defense and national security System of syst......tive analytics and big data syste......ples, theories and applications Defense information, communication, and space technology Fundamentals o......ign, guidance, and control Risk m......ent of Defense and national security Mechanics of t......er uncertainty and cognitive illu......nt in national security Command, control, and communication ......ms engineering and artificial int...... Special topic : improvised explosive devices and weather modifi......gate terrorism and disaster
- Subject HeadingMilitary art and science--Techn......States--Design and construction National security--United States--Decision maki...
Paper図書
National Diet Library
- Subject Heading...ongresses. Web applications--Congresses. ...... Internet. Web applications. World Wide Web.
- Title Heading...library. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
- Author Heading...nference (16th : 2014 : Changsha, Chin......orkshop) (2014 : Changsha Shi, ......Workshop) (1st : 2014 : Changsha, Chin......Workshop) (1st : 2014 : Changsha, China)
Paper図書
National Diet Library
- Summary, etc....lysis of cyber security. Addressing op......tool in global security policy, while ......s on new cyber security technologies w......tives on cyber security and cyber warfare, cyber security implementation......cking, systems security and network security among others.
- Contents...arfare 3 Cyber Security Strategy Imple......System 4 Jedis and Starmen Cyber ......e Force 5 Junk information in hybrid warf......ce 6 Real-time application-layer DDoS att......resentation of Security Control Catalo......ted traffic 14 Security Challenges of IoT-based Smart...
- Subject Heading...ence) Computer security. HISTORY--Military--Other. TECHNOLOGY & ENGINEERING-......puter science. Information architecture. Communications ...
Paper図書
National Diet Library
- Note (General)Papers. "META'08 was part of 'The Science for Peace and Security Program' (...) " -- pref.
- Title HeadingNATO science for peace and security series. Series B Physics and biophysics.
- Author Heading...als for Secure Information and Communication ......nologies (2008 : Marrakech, Morocco)
Paper図書
National Diet Library
- Subject Heading...uter networks--Security measures--Cong......g--Congresses. Information technology--Congresses. M......uter networks--Security measures. Information technology. Mobile computing. Software e...
- Note (General)Abstracts and papers. Held in Bali, Indones...
- Alternative TitleInformation and communication technology : 2nd IFIP TC5/8......nal conference : ICT-EurAsia 2014 : Bali, Indonesi......il 14-17, 2014 : proceedings
Paper図書
National Diet Library
- Summary, etc....ce on computer security offers deep co......es in computer and cyber security theory, applications, and best practices.--
- ContentsPart I. Overview of system and network security: a comprehensiv......ntroduction 1. Information security in the modern ......Verifying user and host identity ......ault tolerance and resilience in ....... Securing web applications, services, and servers / Gera......chelt 11. UNIX and Linux security / Gerald Beuch......2. Eliminating security weakness of Linux and UNIX operating......a 13. Internet security / Jesse Walker......s 15. Intranet security / Bill Mansoor......l area network security (online chapter) / Pramod Pandya 17. Wireless network security / Chunming Ron......sensor network security: the internet of things / Har...
- Subject HeadingComputer security. Computer networks--Security measures. Data......Datensicherung Informationssystem Datenschutz