Listing 1 - 3 of 3 |
Sort by
|
Choose an application
microprocessoren --- randapparatuur --- Computer architecture. Operating systems --- Computer input-output equipment --- Computer peripherals --- Microcomputers --- Minicomputers --- 681.3*B4 --- Mini computers --- Miniature computers --- Small computers --- Electronic digital computers --- Miniature electronic equipment --- Home computers --- Micro computers --- Micros (Microcomputers) --- PCs (Microcomputers) --- Personal computers --- Peripheral computer devices --- Peripheral computer equipment --- Peripheral devices (Computers) --- Peripheral equipment (Computers) --- Peripherals, Computer --- Computer hardware --- Computer I/O equipment --- Computers --- Electronic analog computers --- Hardware, Computer --- I/O equipment (Computers) --- Input equipment (Computers) --- Input-output equipment (Computers) --- Output equipment (Computers) --- Computer systems --- Input/output and data communications (Hardware) --- Input-output equipment --- Computer-randapparaten --- Microcomputer-randapparaten --- Computer-randapparaten. --- Microcomputer-randapparaten. --- 681.3*B4 Input/output and data communications (Hardware)
Choose an application
Computing devices have become ever more present in our everyday environments, however embedding these technologies into our routines has remained a challenge. This book explores the novel theory of peripheral interaction to rectify this. This theory examines how interactive systems can be developed in such a way to allow people to seamlessly interact with their computer devices, but only focus on them at relevant times, building on the way in which people effortlessly divide their attention over several everyday activities in day to day life. Capturing the current state of the art within the field, this book explores the history and foundational theories of peripheral interaction, discusses novel interactive styles suitable for peripheral interaction, addresses different application domains which can benefit from peripheral interaction and presents visions of how these developments can have a positive impact on our future lives. As such, this book’s aim is to contribute to research and practice in fields such as human-computer interaction, ubiquitous computing and Internet of Things, a view on how interactive technology could be redesigned to form a meaningful, yet unobtrusive part of people’s everyday lives. Peripheral Interaction will be highly beneficial to researchers and designers alike in areas such as HCI, Ergonomics and Interaction Design.
Computer Science --- Engineering & Applied Sciences --- Human-computer interaction. --- Computer peripherals. --- Peripheral computer devices --- Peripheral computer equipment --- Peripheral devices (Computers) --- Peripheral equipment (Computers) --- Peripherals, Computer --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems) --- Computer input-output equipment --- Computer science. --- Architectural design. --- User Interfaces and Human Computer Interaction. --- Computers and Society. --- Interaction Design. --- Design --- Structural design --- Informatics --- Science --- User interfaces (Computer systems). --- Computers and civilization. --- Graphic design. --- Civilization and computers --- Civilization --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction
Choose an application
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again. .
Engineering. --- Communications Engineering, Networks. --- Input/Output and Data Communications. --- Systems and Data Security. --- Data transmission systems. --- Data protection. --- Telecommunication. --- Ingénierie --- Données --- Protection de l'information (Informatique) --- Télécommunications --- Transmission --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Electrical Engineering --- Rootkits (Computer software) --- Host-based intrusion detection systems (Computer security) --- Computer peripherals --- Security measures. --- Peripheral computer devices --- Peripheral computer equipment --- Peripheral devices (Computers) --- Peripheral equipment (Computers) --- Peripherals, Computer --- HIDSs (Host-based intrusion detection systems) --- Input-output equipment (Computers). --- Computer security. --- Electrical engineering. --- Computer input-output equipment --- Intrusion detection systems (Computer security) --- Malware (Computer software) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data communication systems --- Transmission of data --- Digital communications --- Electronic data processing --- Electronic systems --- Information theory --- Telecommunication systems --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Telecommuting --- Protection --- Security measures --- Computer hardware --- Computer I/O equipment --- Electronic analog computers --- Hardware, Computer --- I/O equipment (Computers) --- Input equipment (Computers) --- Input-output equipment (Computers) --- Output equipment (Computers) --- Electric engineering --- Engineering --- Input-output equipment
Listing 1 - 3 of 3 |
Sort by
|