Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
"An introduction to the major concepts in cybersecurity that includes case examples and tips for individuals to protect themselves"--
Computer security --- Internet --- Computer networks --- Data protection --- Computer Security --- Electronic data processing --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer network security --- Network security, Computer --- Security of computer networks --- Security systems --- Hacking --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Security measures --- Protection
Choose an application
How complex systems theory sheds new light on the adaptive dynamics of viral populationsViruses are everywhere, infecting all sorts of living organisms, from the tiniest bacteria to the largest mammals. Many are harmful parasites, but viruses also play a major role as drivers of our evolution as a species and are essential regulators of the composition and complexity of ecosystems on a global scale. This concise book draws on complex systems theory to provide a fresh look at viral origins, populations, and evolution, and the coevolutionary dynamics of viruses and their hosts.New viruses continue to emerge that threaten people, crops, and farm animals. Viruses constantly evade our immune systems, and antiviral therapies and vaccination campaigns can be powerless against them. These unique characteristics of virus biology are a consequence of their tremendous evolutionary potential, which enables viruses to quickly adapt to any environmental challenge. Ricard Solé and Santiago Elena present a unified framework for understanding viruses as complex adaptive systems. They show how the application of complex systems theory to viral dynamics has provided new insights into the development of AIDS in patients infected with HIV-1, the emergence of new antigenic variants of the influenza A virus, and other cutting-edge advances.Essential reading for biologists, physicists, and mathematicians interested in complexity, Viruses as Complex Adaptive Systems also extends the analogy of viruses to the evolution of other replicators such as computer viruses, cancer, and languages.
Viruses. --- AIDS. --- Alan Turing. --- Arenavirus. --- Ebola. --- HIV infection. --- HIV-1 transmission. --- HIV-1. --- Hantavirus. --- RNA virus. --- SIS model. --- adaptation. --- antigenic dynamics. --- cellular origin hypothesis. --- complex adaptive system. --- computational objects. --- computer virus. --- cultural evolution. --- ecosystem regulation. --- emerging virus. --- epidemics. --- epitasis. --- evolution. --- evolutionary dynamics. --- evolutionary virology. --- fitness landscape. --- genetic diversity. --- genome reduction. --- human genome. --- human immunodeficiency virus. --- immune system. --- living organisms. --- mutation. --- mutational robustness. --- outbreaks. --- parasite. --- parasites. --- pathogenic viruses. --- population dynamics. --- populations. --- protobiont hypothesis. --- regressive hypothesis. --- replicating machine. --- scale-free networks. --- spatial dynamics. --- viral dynamics. --- viral quasispecies. --- viral symbiosis. --- viral universe. --- virus biology. --- virus dynamics. --- virus landscape. --- virus origins. --- virus-host interaction. --- viruses. --- virus-host interactions.
Choose an application
In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020. The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?
Computer security --- Electronic data processing --- Computer Security --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Cybersecurity --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures --- Computer security. --- Systèmes informatiques --- Chiffrement (informatique). --- Distributed processing. --- Mesures de sûreté.
Choose an application
This book consists of nine papers covering a number of basic ideas, concepts, and methods of nonlinear analysis, as well as some current research problems. Thus, the reader is introduced to the fascinating theory around Brouwer's fixed point theorem, to Granas' theory of topological transversality, and to some advanced techniques of critical point theory and fixed point theory. Other topics include discontinuous differential equations, new results of metric fixed point theory, robust tracker design problems for various classes of nonlinear systems, and periodic solutions in computer virus propagation models.
Research & information: general --- Mathematics & science --- Krasnosel’skiĭ’s fixed point theorem --- positive solutions --- discontinuous differential equations --- differential system --- p-Laplacian --- choquard equation --- nonhomogeneous --- nehari method --- minimax methods --- essential maps --- homotopy --- selections --- PID controller --- sliding mode control --- hybrid Taguchi real coded DNA algorithm --- perturbation estimator --- ℳ?-function --- ℳ?(λ)-function --- τ-function --- essential distance (e-distance) --- e0-metric --- Du-Hung’s fixed point theorem --- Mizoguchi-Takahashi’s fixed point theorem --- Nadler’s fixed point theorem --- Banach contraction principle --- minimax --- multiplicity --- global minima --- Brouwer fixed point theorem --- Hamadard theorem --- Poincaré–miranda theorem --- nonlinear elliptic problem --- Robin boundary condition --- gradient dependence --- sub-supersolution --- positive solution --- periodic solutions --- SEIR-KS model --- computer virus model --- n/a --- Krasnosel'skiĭ's fixed point theorem --- Du-Hung's fixed point theorem --- Mizoguchi-Takahashi's fixed point theorem --- Nadler's fixed point theorem --- Poincaré-miranda theorem
Choose an application
This book consists of nine papers covering a number of basic ideas, concepts, and methods of nonlinear analysis, as well as some current research problems. Thus, the reader is introduced to the fascinating theory around Brouwer's fixed point theorem, to Granas' theory of topological transversality, and to some advanced techniques of critical point theory and fixed point theory. Other topics include discontinuous differential equations, new results of metric fixed point theory, robust tracker design problems for various classes of nonlinear systems, and periodic solutions in computer virus propagation models.
Research & information: general --- Mathematics & science --- Krasnosel’skiĭ’s fixed point theorem --- positive solutions --- discontinuous differential equations --- differential system --- p-Laplacian --- choquard equation --- nonhomogeneous --- nehari method --- minimax methods --- essential maps --- homotopy --- selections --- PID controller --- sliding mode control --- hybrid Taguchi real coded DNA algorithm --- perturbation estimator --- ℳ?-function --- ℳ?(λ)-function --- τ-function --- essential distance (e-distance) --- e0-metric --- Du-Hung’s fixed point theorem --- Mizoguchi-Takahashi’s fixed point theorem --- Nadler’s fixed point theorem --- Banach contraction principle --- minimax --- multiplicity --- global minima --- Brouwer fixed point theorem --- Hamadard theorem --- Poincaré–miranda theorem --- nonlinear elliptic problem --- Robin boundary condition --- gradient dependence --- sub-supersolution --- positive solution --- periodic solutions --- SEIR-KS model --- computer virus model --- n/a --- Krasnosel'skiĭ's fixed point theorem --- Du-Hung's fixed point theorem --- Mizoguchi-Takahashi's fixed point theorem --- Nadler's fixed point theorem --- Poincaré-miranda theorem
Choose an application
This book consists of nine papers covering a number of basic ideas, concepts, and methods of nonlinear analysis, as well as some current research problems. Thus, the reader is introduced to the fascinating theory around Brouwer's fixed point theorem, to Granas' theory of topological transversality, and to some advanced techniques of critical point theory and fixed point theory. Other topics include discontinuous differential equations, new results of metric fixed point theory, robust tracker design problems for various classes of nonlinear systems, and periodic solutions in computer virus propagation models.
Krasnosel’skiĭ’s fixed point theorem --- positive solutions --- discontinuous differential equations --- differential system --- p-Laplacian --- choquard equation --- nonhomogeneous --- nehari method --- minimax methods --- essential maps --- homotopy --- selections --- PID controller --- sliding mode control --- hybrid Taguchi real coded DNA algorithm --- perturbation estimator --- ℳ?-function --- ℳ?(λ)-function --- τ-function --- essential distance (e-distance) --- e0-metric --- Du-Hung’s fixed point theorem --- Mizoguchi-Takahashi’s fixed point theorem --- Nadler’s fixed point theorem --- Banach contraction principle --- minimax --- multiplicity --- global minima --- Brouwer fixed point theorem --- Hamadard theorem --- Poincaré–miranda theorem --- nonlinear elliptic problem --- Robin boundary condition --- gradient dependence --- sub-supersolution --- positive solution --- periodic solutions --- SEIR-KS model --- computer virus model --- n/a --- Krasnosel'skiĭ's fixed point theorem --- Du-Hung's fixed point theorem --- Mizoguchi-Takahashi's fixed point theorem --- Nadler's fixed point theorem --- Poincaré-miranda theorem
Choose an application
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions, and networking services. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.
Electrical Engineering --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Embedded computer systems --- Computer security. --- Data encryption (Computer science) --- Security measures. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Embedded systems (Computer systems) --- Security measures --- Protection of computer systems --- Protection --- Engineering. --- Electronics. --- Microelectronics. --- Electronic circuits. --- Circuits and Systems. --- Systems and Data Security. --- Electronics and Microelectronics, Instrumentation. --- Data protection --- Security systems --- Hacking --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Electrical engineering --- Physical sciences --- Construction --- Industrial arts --- Technology --- Computer security --- Cryptography --- Architecture Analysis and Design Language --- Systems engineering. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Computer Security --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer
Choose an application
An original deep history of the internet that tells the story of the centuries-old utopian dreams behind it--and explains why they have died today. Many think of the internet as an unprecedented and overwhelmingly positive achievement of modern human technology. But is it? In The Internet Is Not What You Think It Is, Justin Smith offers an original deep history of the internet, from the ancient to the modern world--uncovering its surprising origins in nature and centuries-old dreams of radically improving human life by outsourcing thinking to machines and communicating across vast distances. Yet, despite the internet's continuing potential, Smith argues, the utopian hopes behind it have finally died today, killed by the harsh realities of social media, the global information economy, and the attention-destroying nature of networked technology. Ranging over centuries of the history and philosophy of science and technology, Smith shows how the "internet" has been with us much longer than we usually think. He draws fascinating connections between internet user experience, artificial intelligence, the invention of the printing press, communication between trees, and the origins of computing in the machine-driven looms of the silk industry. At the same time, he reveals how the internet's organic structure and development root it in the natural world in unexpected ways that challenge efforts to draw an easy line between technology and nature. Combining the sweep of intellectual history with the incisiveness of philosophy, The Internet Is Not What You Think It Is cuts through our daily digital lives to give a clear-sighted picture of what the internet is, where it came from, and where it might be taking us in the coming decades.
Internet. --- Technology --- Technology and civilization. --- Civilization and machinery --- Civilization and technology --- Machinery and civilization --- Civilization --- Social history --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Social aspects. --- Philosophy --- Abstraction. --- Analogy. --- Analytical Engine. --- Anthropomorphism. --- Antithesis. --- Artificial general intelligence. --- Artificial intelligence. --- Artificial language. --- Artificial life. --- Artificial stupidity. --- Artificiality. --- Attention deficit hyperactivity disorder. --- Automaton. --- Binary code. --- Bullying. --- Caricature. --- Causality. --- Columnist. --- Computer science. --- Computer virus. --- Computer. --- Computing. --- Consciousness. --- Conspiracy theory. --- Controversy. --- Copyright. --- Counterfeit. --- Criticism. --- Curtailment. --- Cyberculture. --- Cybernetics. --- Declamation. --- Detriment (astrology). --- Dichotomy. --- Disputation. --- Distraction. --- Doubt. --- Dystopia. --- Evocation. --- Explanation. --- External storage. --- Fantasy literature. --- Fungus. --- Heresy. --- Hypothesis. --- Imposition. --- Indictment. --- Information overload. --- Information revolution. --- Instance (computer science). --- Intellectual property. --- Internet troll. --- Irony. --- Lie. --- LinkedIn. --- Materialism. --- Naked eye. --- Negation. --- Obesity. --- Ontology (information science). --- Opportunism. --- Outsourcing. --- Overlay network. --- Perception. --- Perversion. --- Pessimism. --- Philosophy. --- Police brutality in the United States. --- Police brutality. --- Printing. --- Processing (programming language). --- Protest. --- Punched card. --- Racism. --- Radicalization. --- Reason. --- Resentment. --- Robbery. --- Scarcity (social psychology). --- Sentience. --- Simulation hypothesis. --- Simulation. --- Slang. --- Slavery. --- Slime mold. --- State of nature. --- Subject (philosophy). --- Syllogism. --- Technology. --- Telecommunication. --- Terminology. --- Theory. --- Thought. --- Tinder (app). --- Twitter. --- Uncertainty. --- Understanding. --- Vandalism. --- Virtual world. --- Writing. --- Internet --- Artificial intelligence --- history. --- History. --- PHILOSOPHY / Ethics & Moral Philosophy. --- PHILOSOPHY / History & Surveys / Modern. --- PHILOSOPHY / Social. --- COMPUTERS / Internet / Online Safety & Privacy. --- COMPUTERS / Internet / Social Media.
Choose an application
Medical telematics --- Data protection --- Telecommunication in medicine --- Computer Communication Networks. --- Computer Security. --- Telemedicine. --- Medical Records Systems, Computerized. --- -Medical telematics --- -Telecommunication in medicine --- -Telecare (Medicine) --- Telemedicine --- Medicine --- Clinical telematics --- Health telematics --- Telehealth --- Medical informatics --- Telematics --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Automated Medical Record System --- Automated Medical Record Systems --- Automated Medical Records System --- Computerized Medical Record --- Computerized Medical Record System --- Computerized Medical Record Systems --- Computerized Medical Records --- Computerized Medical Records System --- Computerized Patient Medical Records --- Medical Record System, Automated --- Medical Record System, Computerized --- Medical Record Systems, Automated --- Medical Record Systems, Computerized --- Medical Record, Computerized --- Medical Records System, Automated --- Medical Records System, Computerized --- Medical Records Systems, Automated --- Medical Records, Computerized --- Automated Medical Records Systems --- Computerized Medical Records Systems --- Record, Computerized Medical --- Records, Computerized Medical --- Forms and Records Control --- Mobile Health --- eHealth --- mHealth --- Health, Mobile --- Telemetry --- Compromising of Data --- Computer Hackers --- Computer Worms --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Hacker, Computer --- Hackers, Computer --- Protection, Information --- Security, Computer --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Computer Network Management --- Databases, Distributed --- Distributed Systems --- Extranets --- Intranets --- Network Communication Protocols --- Telecommunication Networks --- Communication Network, Computer --- Communication Networks, Computer --- Communication Protocol, Network --- Communication Protocols, Network --- Computer Communication Network --- Database, Distributed --- Distributed Database --- Distributed Databases --- Distributed System --- Extranet --- Intranet --- Management, Computer Network --- Network Communication Protocol --- Network Management, Computer --- Network, Computer Communication --- Network, Telecommunication --- Networks, Computer Communication --- Networks, Telecommunication --- Protocol, Network Communication --- Protocols, Network Communication --- System, Distributed --- Systems, Distributed --- Telecommunication Network --- Telecommunications --- Education, Distance --- Europe. --- Northern Europe --- Southern Europe --- Western Europe --- Cyber Security --- Cybersecurity --- Data Encryption --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Security, Cyber --- -Europe. --- Computer Communication Networks --- Computer Security --- Medical Records Systems, Computerized --- Telecare (Medicine) --- Europe --- Security measures --- Medical records --- Access control --- Tele-ICU --- Tele-Intensive Care --- Tele-Referral --- Virtual Medicine --- Medicine, Virtual --- Tele ICU --- Tele Intensive Care --- Tele Referral --- Tele-Referrals --- Medical telematics - Europe. --- Data protection - Europe. --- Telecommunication in medicine - Europe.
Choose an application
This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD). It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in Computer Science privacy research, as well as lightweight solutions appropriate for implementation in IMDs. · Describes problems of security and privacy in implantable medical devices and proposes technological solutions; · Includes basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures; · Provides state-of-the-art research of interest to a multidisciplinary audience in electrical, computer and bioengineering, computer networks and cryptography and medical and health sciences. .
Engineering. --- Data encryption (Computer science) --- Systems engineering. --- Biomedical engineering. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Clinical engineering --- Medical engineering --- Engineering systems --- System engineering --- Construction --- Design and construction --- Data encryption (Computer science). --- Electronic circuits. --- Circuits and Systems. --- Data Encryption. --- Biomedical Engineering. --- Engineering --- Industrial engineering --- System analysis --- Computer security --- Cryptography --- Bioengineering --- Biophysics --- Medicine --- Industrial arts --- Technology --- Cryptology. --- Biomedical Engineering and Bioengineering. --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Implants, Artificial --- Biomedical engineering --- Confidential communications --- Prostheses and Implants --- Computer Security --- Confidentiality --- Privacy --- Biomedical Technology --- Biomedical Technologies --- Technology, Biomedical --- Technology, Health --- Technology, Health Care --- Health Care Technology --- Health Technology --- Biomedical Engineering --- Medical Informatics --- PL 93-579 --- PL93-579 --- Privacy Act --- Public Law 93-579 --- Act, Privacy --- Law 93-579, Public --- PL 93 579 --- PL93 579 --- Public Law 93 579 --- Confidential Information --- Secrecy --- Patient Data Privacy --- Privacy of Patient Data --- Privileged Communication --- Communication, Privileged --- Communications, Privileged --- Data Privacy, Patient --- Information, Confidential --- Privacy, Patient Data --- Privileged Communications --- Duty to Warn --- Disclosure --- Anonymous Testing --- Parental Notification --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Cybersecurity --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Endoprostheses --- Endoprosthesis --- Prostheses --- Prosthetic Implants --- Prosthesis --- Artificial Implant --- Artificial Implants --- Implant, Artificial --- Implant, Prosthetic --- Implants and Prostheses --- Implants, Prosthetic --- Prosthetic Implant --- Prosthesis Retention --- Communications, Confidential --- Confidential relationships --- Privileged communications (Confidential communications) --- Professional secrets --- Secrets, Professional --- Confession --- Criminal law --- Evidence (Law) --- Objections (Evidence) --- Personality (Law) --- Professional ethics --- Privacy, Right of --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Artificial implants --- Implants, Surgical --- Surgical implants --- Biomedical materials --- Surgery --- Law and legislation --- Protection --- Security measures --- Implants, Artificial. --- Computer security.
Listing 1 - 10 of 12 | << page >> |
Sort by
|