Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Secure IT Systems
  • Language: en
  • Pages: 298

Secure IT Systems

  • Type: Book
  • -
  • Published: 2014-10-06
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromsø, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.

Cloud Computing and Services Science
  • Language: en
  • Pages: 394

Cloud Computing and Services Science

  • Type: Book
  • -
  • Published: 2017-07-18
  • -
  • Publisher: Springer

This book constitutes extended, revised and selected papers from the 6th International Conference on Cloud Computing and Services Science, CLOSER 2016, held in Rome, Italy, in April 2016. The 16 papers presented in this volume were carefully reviewed and selected from a total of 123 submissions. The volume also contains two invited papers. CLOSER 2016 focused on the emerging area of cloud computing, inspired by recent advances related to infrastructures, operations, and service availability through global networks. It also studied the influence of service science in this area.

Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards
  • Language: en
  • Pages: 421

Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards

  • Type: Book
  • -
  • Published: 2011-12-31
  • -
  • Publisher: IGI Global

"This book is a collection of research on privacy protection technologies and their application in business organizations"--Provided by publisher.

Computer Safety, Reliability, and Security
  • Language: en
  • Pages: 324

Computer Safety, Reliability, and Security

  • Type: Book
  • -
  • Published: 2016-09-06
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 35th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016. The 24 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on fault injection, safety assurance, formal verification, automotive, anomaly detection and resilience, cyber security, fault trees, and safety analysis.

Cyber Security and Privacy
  • Language: en
  • Pages: 180

Cyber Security and Privacy

  • Type: Book
  • -
  • Published: 2014-11-17
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014. The 14 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on security; accountability, data protection and privacy; research and innovation.

Exploring Security in Software Architecture and Design
  • Language: en
  • Pages: 366

Exploring Security in Software Architecture and Design

  • Type: Book
  • -
  • Published: 2019-01-25
  • -
  • Publisher: IGI Global

Cyber-attacks continue to rise as more individuals rely on storing personal information on networks. Even though these networks are continuously checked and secured, cybercriminals find new strategies to break through these protections. Thus, advanced security systems, rather than simple security patches, need to be designed and developed. Exploring Security in Software Architecture and Design is an essential reference source that discusses the development of security-aware software systems that are built into every phase of the software architecture. Featuring research on topics such as migration techniques, service-based software, and building security, this book is ideally designed for computer and software engineers, ICT specialists, researchers, academicians, and field experts.

Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance
  • Language: en
  • Pages: 352

Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance

  • Type: Book
  • -
  • Published: 2015-03-27
  • -
  • Publisher: Springer

This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 3rd International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security (ESORICS 2014). The volume contains 7 full and 4 short papers plus 1 keynote talk from the DPM workshop; 2 full papers and 1 keynote talk from the SETOP workshop; and 7 full papers and 1 keynote talk from the QASA workshop - selected out of 52 submissions. The papers are organized in topical sections on data privacy management; autonomous and spontaneous security; and quantitative aspects in security assurance.

Privacy and Identity Management for the Future Internet in the Age of Globalisation
  • Language: en
  • Pages: 271

Privacy and Identity Management for the Future Internet in the Age of Globalisation

  • Type: Book
  • -
  • Published: 2015-05-09
  • -
  • Publisher: Springer

This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Patras, Greece, in September 2014. The 9 revised full papers and 3 workshop papers included in this volume were carefully selected from a total of 29 submissions and were subject to a two-step review process. In addition, the volume contains 5 invited keynote papers. The regular papers are organized in topical sections on legal privacy aspects and technical concepts, privacy by design and privacy patterns and privacy technologies and protocols.

Information Security
  • Language: en
  • Pages: 570

Information Security

  • Type: Book
  • -
  • Published: 2015-08-27
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.

Privacy and Identity Management for Emerging Services and Technologies
  • Language: en
  • Pages: 260

Privacy and Identity Management for Emerging Services and Technologies

  • Type: Book
  • -
  • Published: 2014-05-02
  • -
  • Publisher: Springer

This book contains a range of keynote papers and submitted papers presented at the 7th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, held in Nijmegen, The Netherlands, in June 2013. The 13 revised full papers and 6 keynote papers included in this volume were carefully selected from a total of 30 presentations and 11 keynote talks and were subject to a two-step review process. The keynote papers cover the dramatic global changes, including legislative developments that society is facing today. Privacy and identity management are explored in specific settings, such as the corporate context, civic society, and education and using particular technologies such as cloud computing. The regular papers examine the challenges to privacy, security and identity; ways of preserving privacy; identity and identity management and the particular challenges presented by social media.