You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
These proceedings derive from an international conference on the history of computing and education. This conference is the second of hopefully a series of conferences that will take place within the International Federation for Information Processing (IFIP) and hence, we describe it as the "Second IFIP Conference on the History of Computing and Education" or simply "History of Computing and Education 2" (HCE2). This volume consists of a collection of articles presented at the HCE2 conference held in association with the IFIP 2006 World Computer Congress in Santiago, Chile. Articles range from a wide variety of educational and computing perspectives and represent activities from five contine...
This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers in...
Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous. This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.
Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems. Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC). This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.
This book constitutes the refereed proceedings of the IFIP TC 8 International Conference on E-Government and E-Services, EGES 2010 and the IFIP TC 8 International Conference on Global Information Systems Processes, GISP 2010, held as part of the 21st World Computer Congress, WCC 2010, in Brisbane, Australia, in September 2010. The 12 revised full papers presented at EGES were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on interoperability, participation, adoption and diffusion, back-end transformation, and new applications. The 6 revised full papers presented at GISP were carefully reviewed and selected from 13 submissions. They are organized in two parts: global case studies on process design issues with four papers covering the contextual settings of Singapore, Kuwait, Finland and South Africa, and globalized process design with two papers dealing with the demands of large scale process models and a process design project covering two continents.
This volume honors the professional life of Jacques Berleur. He is known for his extensive work within the IFIP community to expose the nature of the ethical dilemmas of a society increasingly reliant on complex ICT infrastructures, to raise awareness of the social challenges this poses, and to influence action compatible with the ethical values of western democracy.
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20–23. The call for papers went out with the challenging motto of “Security & Privacy Silver Linings in the Cloud” build...
Engineering the Knowledge Society (EKS) - Event of the World Summit on the Information Society (WSIS) This book is the result of a joint event of the World Federation of Engineering Organisations (WFEO) and the International Federation for Information Processing (IFIP) held during the World Summit on the Information Society (WSIS) in Geneva, Switzerland, December 11 - 12, 2003. The organisation was in the hands of Mr. Raymond Morel of the Swiss Academy of Engineering Sciences (SATW). Information Technology (or Information and Communication Technology) cannot be seen as a separate entity. Its application should support human development and this application has to be engineered. Education plays a central role in the engineering of Information and Communication Technology (ICT) for human support. The conference addressed the following aspects: Lifelong Learning and education,- inclusion, ethics and social impact, engineering profession, developing- society, economy and e-Society. The contributions in this World Summit event reflected an active stance towards human development supported by ICT. A Round Table session provided concrete proposals for action.