feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • HPol Brandenburg  (6)
  • 2020-2024  (6)
Medientyp
Sprache
Region
Erscheinungszeitraum
Jahr
Fachgebiete(RVK)
  • 1
    UID:
    almahu_9949602262502882
    Umfang: 1 online resource (515 pages)
    Ausgabe: 1st ed.
    ISBN: 9781484228968
    Anmerkung: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Weitere Ausg.: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Sprache: Englisch
    Fachgebiete: Informatik , Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9949544896902882
    Umfang: 1 online resource (XIII, 319 p.)
    ISBN: 9783110711349 , 9783110766820
    Serie: Management, Spirituality and Religion , 1
    Inhalt: Workplace spirituality is an emerging field of study and practice and this book asks the questions: Where have we been in the last ten years as a field and where should we be headed in the next ten years? The editors asked these questions of thought leaders from around the globe, leaders who represent different sectors, faith traditions, worldviews and organizational functions. This volume represents the best of current thinking about the state of the field of workplace spirituality and of what the future holds. There are four themes: (1) management themes such as leadership, ethics, change management, and diversity; (2) workplace spirituality in sectors such as health and wellbeing, policing and creative industries, (3) key issues that are emerging, such as self-spirituality, mindfulness, storytelling and the importance of nature, and (4) cutting edge epistemologies and methodologies including indigenous studies, relational ontology, ethnography, and psychodynamics. These articles were chosen to provoke new thinking, new research, and new practice in the field of workplace spirituality, with the goal of helping the field mature in the next decade.
    Anmerkung: Frontmatter -- , Acknowledgements -- , Foreword -- , Contents -- , Introduction -- , 1 The Past, Present and Future of Workplace Spirituality -- , 2 Introduction to Spirituality -- , Themes -- , 3 Leadership and Spirituality -- , 4 Ethics and Spirituality -- , 5 Spirituality and Religion: Influencing the Strategic Management Field of Research -- , 6 Organizational Change and Work Spirituality: Expanding the Moral Circle -- , 7 Organizational Behavior and Workplace Spirituality -- , 8 Spirituality at Work and Human Resource Management -- , 9 Family Business and Work Spirituality and Religion -- , 10 Gender and Diversity: Intersections of Faith, Religion, and Spirituality -- , Sectors -- , 11 Health and Wellbeing in the Context of Workplace Spirituality -- , 12 Workplace Spirituality and Policing -- , 13 Workplace Spirituality and Creative Industries -- , Key Issues -- , 14 (Western) Self-Spirituality: Literature Review, Conceptual Framework and Research Agenda -- , 15 Mindfulness and More: Spiritual Forms of Meditation -- , 16 Storytelling Nature-spirituality: An Autoethnographic Journey of Rediscovery -- , Epistemologies/Methodologies -- , 17 Indigenous Studies with an Integrative Research Approach -- , 18 Relating Differently: Exploring How a Relational Ontology Might Catalyze Transformative and Emancipatory Action- Oriented MSR Research -- , 19 Workplace Spirituality and the Ethnographic Gaze -- , 20 Psychodynamics and the Field of Management, Spirituality and Religion: Deciphering the Unconscious, Mapping the Soul -- , List of Figures -- , List of Tables -- , About the Authors -- , Index -- , MSR Journal , Issued also in print. , Mode of access: Internet via World Wide Web. , In English.
    In: DG Plus DeG Package 2022 Part 1, De Gruyter, 9783110766820
    In: EBOOK PACKAGE Business and Economics 2022 English, De Gruyter, 9783110992823
    In: EBOOK PACKAGE COMPLETE 2022 English, De Gruyter, 9783110993899
    In: EBOOK PACKAGE COMPLETE 2022, De Gruyter, 9783110994810
    In: EBOOK PACKAGE Economics 2022, De Gruyter, 9783110992922
    Weitere Ausg.: ISBN 9783110711400
    Weitere Ausg.: ISBN 9783110711295
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books.
    URL: Cover
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Wiesbaden :Springer Fachmedien Wiesbaden, | Wiesbaden :Springer Gabler.
    UID:
    almafu_BV046943330
    Umfang: 1 Online-Ressource (VII, 45 Seiten) : , 13 Illustrationen.
    ISBN: 978-3-658-31801-7
    Serie: essentials
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-3-658-31800-0
    Sprache: Deutsch
    Fachgebiete: Wirtschaftswissenschaften
    RVK:
    Schlagwort(e): Gesundheitswesen ; Virtuelle Realität ; Avatar ; Electronic books.
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    kobvindex_HPB1246551039
    Umfang: 1 online resource (xi, 190 pages) : , illustrations (some color).
    ISBN: 9783030631314 , 3030631311
    Serie: Urban book series,
    Inhalt: This open access book addresses the way in which urban and urbanizing regions profoundly impact and are impacted by climate change. The editors and authors show why cities must wage simultaneous battles to curb global climate change trends while adapting and transforming to address local climate impacts. This book addresses how cities develop anticipatory and long-range planning capacities for more resilient futures, earnest collaboration across disciplines, and radical reconfigurations of the power regimes that have institutionalized the disenfranchisement of minority groups. Although planning processes consider visions for the future, the editors highlight a more ambitious long-term positive visioning approach that accounts for unpredictability, system dynamics and equity in decision-making. This volume brings the science of urban transformation together with practices of professionals who govern and manage our social, ecological and technological systems to design processes by which cities may achieve resilient urban futures in the face of climate change.
    Anmerkung: A framework for resilient urban futures -- How we got here -- Social, ecological and technological strategies for climate adaptation -- Mapping vulnerability to weather extremes -- Producing and communicating flood risk.
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    kobvindex_HPB1165995690
    Umfang: 1 online resource (XXIV, 975 p. 155 illus., 111 illus. in color.).
    Ausgabe: 1st ed. 2020.
    ISBN: 3030323943 , 9783030323943 , 9783030323936 , 3030323935 , 9783030323950 , 3030323951 , 9783030323967 , 303032396X
    Serie: Invading Nature - Springer Series in Invasion Ecology ; 14
    Inhalt: This open access volume presents a comprehensive account of all aspects of biological invasions in South Africa, where research has been conducted over more than three decades, and where bold initiatives have been implemented in attempts to control invasions and to reduce their ecological, economic and social effects. It covers a broad range of themes, including history, policy development and implementation, the status of invasions of animals and plants in terrestrial, marine and freshwater environments, the development of a robust ecological theory around biological invasions, the effectiveness of management interventions, and scenarios for the future. The South African situation stands out because of the remarkable diversity of the country, and the wide range of problems encountered in its varied ecosystems, which has resulted in a disproportionate investment into both research and management. The South African experience holds many lessons for other parts of the world, and this book should be of immense value to researchers, students, managers, and policy-makers who deal with biological invasions and ecosystem management and conservation in most other regions.
    Anmerkung: PART 1: BACKGROUND -- Chapter 1: Biological invasions in South Africa: An overview -- Chapter 2: A brief, selective history of researchers and research initiatives related to biological invasions in South Africa -- PART 2: BIOLOGICAL INVASIONS IN SOUTH AFRICA -- Chapter 3: The biogeography of South African terrestrial plant invasions -- Chapter 4:Invasive alien aquatic plants in freshwater ecosystems -- Chapter 5: Terrestrial Vertebrate Invasions in South Africa -- Chapter 6: Alien freshwater fauna in South Africa -- Chapter 7: Alien terrestrial invertebrates in South Africa -- Chapter 8: Biological invasions in South Africa's offshore sub-Antarctic territories -- Chapter 9: Coastal invasions: The South African context -- Chapter 10: Pathogens of vertebrate animals as invasive species: Insights from South Africa -- Chapter 11: Biological invasions in South Africa's urban ecosystems: Patterns, processes, impacts and management -- PART 3: DRIVERS OF INVASION -- Chapter 12: South Africa's pathways of introduction and dispersal and how they have changed over time -- Chapter 13: The role of environmental factors in promoting and limiting biological invasions in South Africa -- Chapter 14: Biotic interactions as mediators of biological invasions: Insights from South Africa -- PART 4: IMPACTS OF INVASION -- Chapter 15:Impacts of invasions on terrestrial water resources in South Africa -- Chapter 16:The impact of invasive alien plants on rangelands in South Africa -- Chapter 17: An evaluation of the impacts of alien species on biodiversity in South Africa using different methods -- PART 5: MANAGEMENT OF INVASIONS -- Chapter 18: Biological invasion policy and legislation development and implementation in South Africa -- Chapter 19: More than a century of biological control against invasive alien plants in South Africa: a synoptic view of what has been accomplished -- Chapter 20:Analysing the risks posed by biological invasions to South Africa -- Chapter 21:The extent and effectiveness of alien plant control projects in South Africa -- Chapter 22: Experience and lessons from alien and invasive animal control projects carried out in South Africa -- Chapter 23: Biological invasions and ecological restoration in South Africa -- Chapter 24: The social dimensions of biological invasions in South Africa -- Chapter 25: Education, training and capacity building in the field of biological invasions in South Africa -- PART 6: NEW INSIGHTS -- Chapter 26: South Africa as a donor of naturalized and invasive alien plants to other parts of the world -- Chapter 27: South Africa as a donor of alien animals -- Chapter 28: Knowing-doing continuum or knowing-doing gap? Transferring research results to managers of biological invasions in South Africa -- Chapter 29: Biological invasions as a component of South Africa's global change research effort -- Chapter 30: South Africa's Centre for Invasion Biology: An experiment in invasion science for society -- PART 7: THE WAY FORWARD -- Chapter 31:Potential futures of biological invasions in South Africa.
    Weitere Ausg.: ISBN 3-030-32393-5
    Sprache: Englisch
    Schlagwort(e): Classification
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    kobvindex_HPB1233041668
    Umfang: 1 online resource (300 pages)
    ISBN: 3839451450 , 9783837651454 , 3837651452 , 9783839451458
    Serie: Music and sound culture ; volume 44
    Inhalt: Music and sound shape the emotional content of audio-visual media and carry different meanings. This volume considers audio-visual material as a primary source for historiography. By analyzing how the same sounds are used in different media contexts at different times, the contributors intend to challenge the linear perspective of (music) history based on canonic authority. The book discusses AV-Documents (analysis in context), methodological questions (implications for research, education, and popularization of knowledge), archives of cultural memory (from the perspective of Cultural Studies) as well as digitalization and its consequences (organization of knowledge).
    Anmerkung: Frontmatter -- , Contents -- , Editor's Note -- , An Introduction -- , "Living in a Material World," Contemplating the Immaterial One--Musings on What Sounds Can Actually Tell Us, or Not -- , The (Re)Construction of Communicative Pasts in the Digital Age -- , The Narratological Architecture of Musical lieux de mémoire -- , Beethoven in 1970, Bernstein and the ORF: Cultural Memory and the Audiovisual -- , Women's Voices in Radio -- , 'Real Sound, ' Readymade, Handmade: Musical Material and the Medium Between Mechanization, Automation, and Digitalization as an Impression and Expression of Reality -- , Sonic Icons in A Song Is Born (1948): A Model for an Audio History of Film -- , The Production, Reception and Cultural Transfer of Operetta on Early Sound Film -- , The Address of the Ear: Music and History in Waltz with Bashir -- , "I've never understood the passion for Schubert's sentimental Viennese shit"--Using Metadata to Capture the Contexts of Film Music -- , Connecting Research: The Interdisciplinary Potential of Digital Analysis in the Context of A. Kluge's Televisual Corpus -- , Modelling in Digital Humanities: An Introduction to Methods and Practices of Knowledge Representation -- , Playing with a Web of Music: Connecting and Enriching Online Music Repositories -- , A Few Notes on the Auditive Layer of the Film -- , Afterword -- , List of Contributors , In English.
    Weitere Ausg.: Print version: 9783839451458
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books.
    URL: OAPEN
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz