検索結果 263 件

デジタル電子書籍・電子雑誌図書
2022
インターネットで読める国立国会図書館
図書
edited by Sabyasachi Pramanik, Debabrata Samanta, M. Vinay and Abhijit GuhaWiley2022<M154-D47>
国立国会図書館
  • 要約等CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a te...... comprehensive and up-to-date stu......tions of cyber security and network security for engineers,......sts, students, and other professi......ng keeps on expanding, it is incr...... methodologies and advances that ...... guarantee the security of online netw......going advances and innovations ha......taking care of security issues in a me......his, organized security innovations ha...... guarantee the security of programming and correspondence......tal, improved, and engineering le......els. This outstanding new volume ......, innovations, and developments in practical app...
  • 内容細目.../ Binay Kumar Pandey, Digvijay Pandey, Subodh Wair......sachi Pramanik Security, Privacy, Risk, and Safety Toward ...... Rajesh Bose, Sandip Roy Big Data......re for Network Security / Bijender Ban......chi Pramanik, Sandip Roy, Ankur Gupta About the ...
  • 件名Computer security Computer networks--Security measures Computer Security Sécurité inf......uter networks--Security measures. Computer security.
図書
edited by Ali Ismail Awad and Michael FairhurstThe Institution of Engineering and Technology2018<M154-D27>
国立国会図書館
  • 要約等...uting hardware and software, and data encryption, and the widespread......ata processing and electronic bus......ng increase in information security threats. The l......st advances in information security have increased......al deployments and scalability ac...... better secure and protect our information systems and the information stored, processed and transmitted. T......ging trends in information security from the foundations and technologies i......ometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer fore......rnet of Things security, and network security. Inform...
  • 内容細目...hannel attacks and hardware Troja......ea Ismail Cybersecurity: timeline malware analysis and classification......identification and continuous aut......iankun Hu Data security and privacy in the Interne......amien Sauveron Information security algorithm on embedded hardwar...
  • 件名Computer security Security systems Data protection Security systems. Data ......tion. Computer security.
図書
Hideaki Ishii, Quanyan Zhu, editorsSpringer[2022]<M131-D18>
国立国会図書館全国の図書館
  • 要約等... for increased security and resilience lev......n of knowledge and models of the ......ional IT-based security measures. The ......ves on network security, game theory, and control, as we......silient, safe, and secure control......ata injections and denial-of-serv...... very harmful, and may not be det......ted unless the security measures explo......nal processing and computer scien......contributions--Security and Resilience of ...... practitioners and graduate students with a broa...
  • 内容細目Part I. Resilient Control and Estimation Und......g Ren, Henrik Sandberg, Karl H. J......k, Variations, and Countermeasure...... Communication and Privacy in Control Res......ical Locations and at Edge / Azwi...... A Tutorial on Security and Privacy Challenges in ......Cyber-Physical Security for Applicatio...... Cyber-Defense and Robust Switchi......Learning-Based and Physics-Based ......ng, Protection and Control Systems / Gelli Ravik...
  • 件名Computer security Automatic control--Security measures Coope......uter systems)--Security measures Elect......er production--Security measures Progr......e controllers--Security measures Security systems System......tems) Computer Security Systems Theory......rmatiques) Commande automatique--......orie de la commande security systems. Computer security. Control theory. Security systems. System theory.
図書
Henry Farrell, Abraham L. Newman.Princeton University Press[2019]<A225-D7>
国立国会図書館全国の図書館
  • 内容細目Introduction: Freedom and security in the new int......ce 2. Domestic security and privacy in the transat......antic alliance and the fight over......ional layering and the regulation...... 5. Insulation and the transforma...... of commercial privacy disputes Conclusion: Information, power, and world politics.
  • 件名Privacy, Right of. Data protection.
  • 資料の内容に関する注記...d world, where security problems like ......cross borders, and globalized data networks and e-commerce pla...... jurisdictions and rule systems c......s over freedom and security? Of Privacy and Power investig......European Union and United States,......have regulated privacy and security, and how their agreements and disputes have ......e over freedom and security has usually be......European Union and a belligerent ...... Henry Farrell and Abraham Newman......--one favoring security, the other lib......e, e-commerce, and privacy rights. Lookin......at three large security debates in the......g controversy, and Edward Snowden's revelations,...
図書
by Andrew B. Serwin.Thomson Reuters2017.<A225-B468>
国立国会図書館
  • 件名Data protection--Law and legislation. Privacy, Right of. Dat......rotection--Law and legislation--E......ion countries. Privacy, Right of--European Union cou...
  • 一般注記...n treatise to: Information security and privacy: a guide to federal and state law and compliance.
  • 並列タイトル等(連結)Guide to international law and compliance
図書
edited by John R. Vacca.Morgan Kaufmann Publishers, an imprint of Elsevier[2017]<M154-B211>
国立国会図書館
  • 要約等...ce on computer security offers deep co......es in computer and cyber security theory, applications, and best practices.--
  • 内容細目Part I. Overview of system and network security: a comprehensi......ntroduction 1. Information security in the modern ......Verifying user and host identity ......ault tolerance and resilience in ......ons, services, and servers / Gera......chelt 11. UNIX and Linux security / Gerald Beuch......2. Eliminating security weakness of Linux and UNIX operating......a 13. Internet security / Jesse Walker......s 15. Intranet security / Bill Mansoor......l area network security (online chapter) / Pramod Pandya 17. Wireless network security / Chunming Ron......sensor network security: the internet ......as M. Chen 19. Security for the internet of things / ...
  • 件名Computer security. Computer networks--Security measures. Data......Datensicherung Informationssystem Datenschutz
図書
Elisa Bertino, Kenji TakahashiArtech House[2011]<ND633-D20>
国立国会図書館
  • タイトル標目Artech House information security and privacy series
図書
Carsten Sander Christensen, Vakhtang Maisaia, [editors]IGI Global[2021]<A162-D9>
国立国会図書館
  • 要約等...t geopolitical and geostrategic conditions and review how new......iance military and defense doctri...... to the understanding of the tran......on of regional security environment in aegis of the E...
  • 件名... Organization. Security, International National security--Europe National security--Asia Irregula......fare. National security. Security, International. Strategic asp...
  • 著者標目Sander Christensen, Carsten Maisai...
図書
Amit Kumar Singh, Anand Mohan, editors.Springer[2019]<M151-D1>
国立国会図書館全国の図書館
  • 要約等This handbook is organiz...... part of this handbook deals with multimedia security for emerging a......ltimedia tools and applications, biological and behavioral bio......dia encryption and secure waterma......n approach for android mobile devices, and multimedia using chaotic and perceptual has...... part of this handbook focuses on......ion techniques and role of de-noi......age processing and it application......e enhancements and de-noising tec......sion approach, and automated dete...... part of this handbook introduces......ia in medicine and multimedia for......m for e-health security, analysis of r......es for emotion and activity recognition. Further...
  • 内容細目...7. Enhancement and De-noising of ...... with Teaching and Learning based......lateral Method and Bayes Shrinkag......g 11. Detector and descriptor based Recognition and Counting of Ob......s for e-Health Security 3. ECG Security Challenges: Ca......ture Reduction and Tree Classifie......using Big Data and Hybrid Machine......ehavior Understanding 7. Digital ......ations, Trends and Forecasts 8. R......T Driven Broadband Multimedia Pro......ctive Analysis and Potential Chal......ate-of-the-art and Potential Challenges.
  • 件名Multimedia systems. Computer security.
図書
Paul PedleyFacet Publishing2020<UL11-D12>
国立国会図書館全国の図書館
  • 要約等Privacy is a core valu...... librarianship and yet as a conce...... considers how privacy issues can ari......ibrary context and what library and information professionals ......to protect the privacy of their users......iding insights and practical step......h case studies and scenarios supp......brary setting, and the lessons we......an librarians, and international ......cate how they handle the personal......ice with their privacy policy statements, their privacy audits, and data protectio......t assessments. Privacy is not the sam......ta protection, and the book outlines the differe...
  • 内容細目...xamples of how privacy issues arose in the 19th and 20th centuries......o library user privacy so much bigger......1.3 Why is the privacy of library use......elationship of privacy with other val......g library user privacy is not merely ......erent types of privacy 1.4 The types ......raries 1.5 The privacy of the library......c space 2. How privacy is regulated i......idelines 2.4 Standards 2.5 Ethica......legal cases on privacy 2.6.3 American......legal cases on privacy in bookshops and libraries 3. P......al examples of privacy issues arising......line databases and personalisatio......o balance both privacy and security considerations 3...
  • 件名...Social aspects Privacy, Right of Data......ocial aspects. Privacy, Right of. Protection de l'information (informatique)......rotection de l'information (informatique) Droit à la vi...
図書
Springerc2012.<M17-13-1858>
国立国会図書館
  • 件名Computer security--Congresses. D......uter networks--Security measures--Cong......ses. Internet--Security measures--Cong......uter software. Information Systems. Manag......t of Computing and Information Systems. Data ......ion. Computers and Society. Algorithm Analysis and Problem Complexity. Information Systems Applications (incl. I...
  • その他のタイトルInformation security and privacy research : 27t...... international information security and privacy conference, SEC 2012 : Herakl...
  • タイトル標目IFIP advances in information and communication technology ; 37...
図書
edited by Bobbi Newman, Bonnie Tijerina.Rowman & Littlefield[2017]<UL511-B116>
国立国会図書館
  • 内容細目Foundations of privacy in libraries /......onnie Tijerina and Michael Zimmer......Foundations of privacy in libraries /......Michael Zimmer and Bonnie Tijerina Privacy law and regulation / Michael Zimmer and Deborah Caldwell-Stone Use, security, and ethhics of dat......etention, use, and security / Matt Beckstrom Use, security, and ethics of data......sks, benefits, and user privacy : evaluating t......library data / Andrew Asher Third......ulie L. Oborny Privacy training for staff and patrons : the data privacy project at Bro......elissa Morrone Privacy training for staff and patrons : privacy initiatives at The City Unive...
  • 件名Library records--Law and legislation--U......rotection--Law and legislation--United States. Privacy, Right of--United States. Con...
図書
Ziska Fields.Information Science Reference, an imprint of IGI Global[2018]<ND633-B132>
国立国会図書館
  • 要約等..., governmental and societal level......one to enhance security at these diffe......ware, criminal and strategic hack......errorism, cybersecurity trends, cyber offensive and defensive capa......rensics, cloud security, mobile security"--
  • 件名Computer networks--Security measures. Electronic information resources--Access control. Co...
図書
Kevin Daimi, editor, associate editors, Guillermo Francia, Levent Ertaul, Luis Hernandez Encinas, Eman El-Sheikh.Springer[2018]<ND633-B126>
国立国会図書館
  • 要約等...t IT resources and communicate with security specialists when there is a security problem. The b...... wide range of security topics includi......ogies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It ......s, approaches, and trends needed by security specialists to improve their security skills and capabilities. ......rections where security techniques, po...... applications, and theories are h......fully selected and reviewed chapt......ten by diverse security experts in the listed fields and edited by prominent security ...
  • 内容細目...vey of Threats and Solutions Chap......form a Virtual Security Shield PART 3:......IES Chapter 12.Security Threats and Solutions for ......ew of the Main Security Threats and Challenges in ...... 4: BIOMETRICS AND FORENSICS Chap......Authentication and Data Security in Cloud Compu......ics Chapter 21.Privacy Preserving Int......rt v. HARDWARE SECURITY Chapter 22. Ex......Enhance ROPUFs Security against Modeli......es: Advantages and Trade Offs PART 6. SECURITY APPLICATIONS C...... Specification and Processing for Inter-System Information Flow Tracking ....... On Inferring and Characterizing......-Scale Probing and DDoS Campaigns Chapter 27.Des...
  • 件名Computer networks--Security measures. Computer security. Engineering. ......em Performance and Evaluation. Systems and Data Security.
図書
Takaya MatsuuraSpringer[2023]<M121-D73>
国立国会図書館全国の図書館
  • 要約等...riable quantum information processing to ......lds of quantum information processing, qu...... communication and quantum comput......ng-sought full security of continuous-......ribution (QKD) and proposal of a ......ook provides a security of continuous-......ication rounds and the use of digitized information processing. The book also pro...
  • 内容細目...les of Quantum Information Theory 2.1.1 Linear Operator and Quantum State ......ntum Operation and Quantum Channe......um Measurement and Quantum Instru.......4 Qubit as an Information Unit 2.2 Measu......The Trace Norm and The Trace Dist......3.1.1 Position and Momentum Opera......istic Function and Wigner Functio......sian Channels, and Gaussian Measu...... 4.2 Notations and Preliminaries ......assical Linear Information Processing as .......3 Definitions and Properties of ...... QKD 4.3.3 The Security Condition of t......h to Prove the Security Condition 4.3.5 The Privacy Amplification .......4 Finite-Size Security of Continuous-Variable QKD wi...
  • 関連情報Springer theses : recognizing outstanding Ph. D. research
図書
K.G. Srinivasa, Siddesh G.M., S.R. Mani Sekhar, editorsSpringer[2021]<SC221-D90>
国立国会図書館
  • 要約等...ction, storage and analysis of data and their usage in......l intelligence and machine learni......ovides various security and privacy mechanisms use......in healthcare; and finally, part ...... visualization and data analytics
  • 内容細目Introduction to Healthcare Information Management and Machine Learni......ata Collection and Processing in ......for Healthcare Security and Privacy Issues in Heal......ough Self Help and Assistive Tech......Classification and Prediction of ......duction Number and Herd Immunity ......are: Using IoT and Machine Learning based Analyt...
図書
Chris Jay Hoofnagle.Cambridge University Press[2016]<AU-211-B452>
国立国会図書館
  • 要約等...t regulator of information privacy - and thus innovatio......ness practices and serve to regul......d by observers and even those who......ts, historians and anyone else in......sted in understanding the FTC's privacy activities and how they fit in the context o...
  • 内容細目Part I. The History, powers, and procedure of t......ion 2. The FTC and the rise of co......Organizational and procedural basics 5. Unfair and deceptive prac...... regulation of privacy 6. Online privacy 7. Privacy of children 8. Information security 9. Anti-market......telemarketing, and malware 10. Financial privacy 11. International privacy efforts Part I......hening the FTC and protecting privacy.
  • 件名...de Commission. Privacy, Right of--Uni......rotection--Law and legislation--U......rotection--Law and legislation--United States.
図書
edited by Paul CornishOxford University Press2021<M151-D28>
国立国会図書館全国の図書館
  • 内容細目...ce: What it is and Why it Matters......tunity, Threat and Dependency in ......vens Ethical Standards and 'Communication......eill Part II : Security in Cyber Space......s, Swindlers, Bandits, and Privateers in ...... Sense of Cybersecurity in Emerging Te......Malta de Sá Brandão Part III : Security in Cyber Space: Extremism and Terrorism. Man......lent Extremism and Anti-Democrati......al Space / Alexander Corbeil, Raf......yberweapons / Sandro Gaycken Intentions and Cyberterrorism......nology: Access and Denial / Caitr......einl Part IV : Security in Cyber Space...... Cyber-Enabled Information Warfare and Information Opera...
  • 件名Computer security Computer networks--Security measures Cyber......ence (Computer security) Computer Security Sécurité inf......uter networks--Security measures. Computer security.