feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • ZZF Potsdam  (12)
  • HPol Brandenburg  (7)
  • HFS Ernst Busch  (4)
  • SB Beeskow  (2)
  • SB Luckenwalde  (1)
  • SB Hennigsdorf  (1)
Type of Medium
Language
Region
Library
Virtual Catalogues
Access
  • 1
    Book
    Book
    Frankfurt am Main :Eichborn,
    UID:
    almafu_BV019860112
    Format: 855 S. : , Ill.
    ISBN: 3-8218-0759-8
    Uniform Title: Oskar Schindler
    Language: German
    Subjects: History
    RVK:
    Keywords: 1908-1974 Schindler, Oskar ; Biografie ; Biografie ; Biografie ; Biographischer Beitrag ; Biographie ; Biografie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949602262502882
    Format: 1 online resource (515 pages)
    Edition: 1st ed.
    ISBN: 9781484228968
    Note: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Additional Edition: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almafu_BV046050430
    Format: 590 Seiten.
    ISBN: 978-3-96317-161-1
    Series Statement: Beiträge zur Tiergeschichte Band 3
    Note: Rezensiert in: Bayerisches Jahrbuch für Volkskunde (2020), Seite 278-279 (Michaela Fenske, Würzburg) , Dissertation Friedrich-Schiller-Universität Jena 2019
    Additional Edition: Erscheint auch als Online-Ausgabe, PDF ISBN 978-3-96317-699-9
    Additional Edition: Erscheint auch als Online-Ausgabe, EPUB ISBN 978-3-96317-705-7
    Language: German
    Subjects: Ethnology , General works , Sports Science
    RVK:
    RVK:
    RVK:
    Keywords: Pferd ; Mensch ; Anthrozoologie ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift ; Historische Darstellung ; Biographischer Beitrag ; Hochschulschrift
    URL: Cover
    URL: Rezension  (H-Soz-Kult)
    Author information: Kleijn, David M. de 1984-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almafu_BV004343370
    Format: IV, 112 S.
    ISBN: 0-8133-8164-9
    Series Statement: Special report
    Language: English
    Subjects: Economics
    RVK:
    RVK:
    Keywords: Wirtschaftsreform ; Wirtschaftsreform ; Wirtschaftsreform ; Weltwirtschaft ; Wirtschaftsreform ; Konferenzschrift ; Konferenzschrift ; Konferenzschrift ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_BV005431992
    Format: VII, 56 S.
    ISBN: 0-913449-24-5 , 0-8133-8165-7
    Series Statement: Institute for East West Security Studies 〈New York, NY〉: Occasional paper series 20
    Language: English
    Subjects: Economics
    RVK:
    RVK:
    Keywords: Wirtschaftsreform ; Wirtschaftsreform ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Book
    Book
    Jefferson [u.a.] :McFarland,
    UID:
    almahu_BV000317978
    Format: VII, 296 S. : Ill.
    ISBN: 0-89950-123-0 , 978-0-89950-123-9
    Language: English
    Subjects: General works
    RVK:
    Keywords: Jugendfilm ; Film ; Jugend ; Jugend ; Film
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_BV041234196
    Format: 448 S. ; , 215 mm x 135 mm.
    ISBN: 978-3-8479-0532-5 , 3-8479-0532-5
    Uniform Title: Is That a Fish in Your Ear?
    Language: German
    Subjects: Comparative Studies. Non-European Languages/Literatures
    RVK:
    RVK:
    Keywords: Übersetzung
    Author information: Bellos, David, 1945-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_1845083628
    Format: 128 Seiten , 24 cm x 17 cm
    ISBN: 9783954103157 , 395410315X
    Content: Die Beiträge in diesem Band widmen sich aus verschiedenen Perspektiven dem Thema Medizin im Nationalsozialismus und der kontroversen Aufarbeitung der historischen Ereignisse in der Nachkriegszeit und bis in die Gegenwart. Wie wurde beispielsweise das in der Bundesrepublik eingeführte Sterilisationsgesetz vor dem Hintergrund von NS Zwangssterilisationen gesehen? Welche Rolle spielt der Nürnberger Kodex bis heute für die Medizin und wie werden damit verbundene medizinethische Fragen diskutiert? Warum ist es wichtig, dass »Medizin im Nationalsozialismus« Teil des Medizinstudiums ist? Die Komplexe Erinnern, Mahnen und Gedenken werden anhand historischer Ereignisse und Zusammenhänge sowie aktueller medizinhistorischer Forschungsergebnisse beleuchtet, reflektiert und diskutiert.
    Note: "Zu diesen wichtigen Projekten zählt auch das Symposium der universitären Frauenheilkunde 'Erinnern, Mahnen, Gedenken' vom 22. März 2023, dessen Vorträge dieser Tagungsband versammelt, die sich vor allem verschiedenen Facetten der Lehren aus der Geschichte widmen." (Vorwort) , Literaturangaben
    Language: German
    Subjects: History , Medicine
    RVK:
    RVK:
    Keywords: Deutschland ; Nationalsozialismus ; Medizin ; Vergangenheitsbewältigung ; Kollektives Gedächtnis ; Geschichte ; Deutschland ; Nationalsozialismus ; Medizin ; Vergangenheitsbewältigung ; Kollektives Gedächtnis ; Geschichte ; Konferenzschrift ; Aufsatzsammlung
    URL: Cover
    Author information: Sehouli, Jalid 1968-
    Author information: David, Matthias 1961-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    Manchester u.a. :Manchester Univ. Press u.a.,
    UID:
    almafu_BV005460405
    Format: XII, 260 S. : Ill., Kt.
    ISBN: 0-7190-3035-8
    Series Statement: Studies in imperialism
    Language: English
    Subjects: History
    RVK:
    Keywords: Kolonialismus ; Kolonialverwaltung ; Polizei ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Book
    Book
    Rochester, New York :Camden House,
    UID:
    almahu_BV049480209
    Format: xiii, 328 Seiten : , Illustrationen.
    ISBN: 978-1-64014-151-3 , 1-64014-151-0
    Content: "A social history of West Germany's Bundesgrenzschutz (BGS, Federal Border Police) that complicates the telling of the country's history as a straightforward success story. The 2020 murder of George Floyd by Minneapolis police officers shows that police violence is still a problem in Western democracies. Floyd's murder prompted some critics to hail the German police as a model of democratic policing that should be emulated. After 1945, Germany's police forces had supposedly shed the militarization and authoritarian impulses still prevalent in other nations' forces. These uncritical appraisals, however, deserve closer analysis. This book is a social history of West Germany's Bundesgrenzschutz (BGS), a federal border guard established in 1951 that became re-unified Germany's first national police force. It argues that the BGS revived authoritarian traditions of militarized policing and kept them alive long into the postwar era even though the country was supposedly consigning these problematic legacies to its past. The BGS was staffed and led by Wehrmacht and SS veterans until the late 1970s, and while West Germany was democratizing, BGS commanders were still planning to fight wars and were teaching its officers "street fighting" tactics. While the end outcome was positive, the study contributes to the growing body of recent research that complicates the writing of the Federal Republic's history as a "success story." Dealing explicitly with post-fascist West Germany's struggle to establish a democratic police force, the book enters a conversation with studies concerned with democratization, security, and Germany's effort to overcome its Nazi past. DAVID M. LIVINGSTONE holds a PhD in History from the University of California-San Diego. He is retired as Chief of Police of Simi Valley, California and is an adjunct professor at California Lutheran University"--
    Note: The shadow of Weimar political violence in the making of West Germany's BGS -- Men of the first hour : veteran soldiers and the police organization they made -- Who wants to be a soldier? The BGS and West Germany's new army -- Recruitment and rebuilding the BGS -- Militarization and training for war -- Professional ethics and moral training -- The debate over combatant status and its consequences -- Bonn's "problem child" : the struggle to modernize the BGS -- From Munich to Mogadishu : fighting terrorism at home and abroad -- More than guarding borders : from BGS to Bundespolizei -- Conclusion : Germany's police : a model for democratic policing?
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-80543-253-1
    Language: English
    Subjects: History
    RVK:
    Keywords: Demokratisierung ; Grenzpolizei
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages