feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (19)
  • 1800-1809  (1)
Type of Medium
Region
Years
Year
Subjects(RVK)
Access
  • 1
    UID:
    gbv_664587267
    Format: XX, 358 S. , Ill., graph. Darst , 235 mm x 155 mm
    ISBN: 364223156X , 9783642231568
    Series Statement: The frontiers collection
    Additional Edition: ISBN 9783642231575
    Additional Edition: Online-Ausg. Brun, René From the Web to the Grid and Beyond Berlin, Heidelberg : Springer Berlin Heidelberg, 2012 ISBN 9783642231575
    Language: English
    Keywords: Hochenergiephysik ; Forschungsprozess ; Informationstechnik ; Softwareentwicklung ; Grid Computing ; Aufsatzsammlung
    Author information: Brun, René
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV041903698
    Format: [63] Bl. , überw. Ill., Kt. , 480 mm x 330 mm
    ISBN: 9783775738576 , 3775738576
    Language: German
    Subjects: Romance Studies
    RVK:
    Keywords: Casanova, Giacomo Girolamo 1725-1798 ; Casanova, Giacomo Girolamo 1725-1798 ; Reise ; Autobiografie ; Bildband ; Autobiografie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_731597036
    Format: 1 DVD-Video (NTSC 87 Min.) , farb., Dolby Digital 2.0, 5.1, Widescreen, Regionalcode: 4 , 12 cm
    Content: "The Brazilian Government leads Latin American countries in the fight against drug cartels. In response drug cartels start a series of attacks against Brazil's cities and natural resources. Their first target is the Amazon Forest"--IMDb
    Note: Special features: Cast; Coaching staff; Authorities , Photography, Jota Passos, Bruno Fantini ; music, Juliano Cortuah , Orig: BR 2010 , Sprache: span. - Untertitel: engl., portug. u. span.
    Language: Portuguese
    Keywords: DVD-Video
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_771333765
    Format: 87 S. , zahlr. Ill.
    Edition: 2. ed.
    ISBN: 9788817057363
    Language: Italian
    Keywords: Italienisch ; Kinderlyrik ; Kinderbuch
    Author information: Carminati, Chiara 1971-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV044271557
    Format: 96 Seiten , 23 cm, 200 g
    ISBN: 9783889751331
    Language: German
    Keywords: Palästina ; Israel ; Besatzungspolitik ; Menschenrechtsverletzung ; Gewaltloser Widerstand
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    b3kat_BV042129180
    Format: [65] Bl. , überw. Ill.
    ISBN: 9782850886256
    Language: French
    Subjects: Romance Studies
    RVK:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_799019119
    Format: 393 Seiten , 24 cm
    Edition: Prima edizione
    ISBN: 8863725160 , 9788863725162
    Series Statement: Edizione delle opere di Giovan Battista Marino 1
    Note: Literaturverzeichnis: Seite [365]-379 , Hier auch später erschienene, unveränderte Nachdrucke der Auflage , Includes introduction by the editor (p. [9]-50)
    Additional Edition: ISBN 9788863726817
    Language: Italian
    Keywords: Marino, Giambattista 1569-1625
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    San Rafael, California 〈1537 Fourth Street, San Rafael, CA 94901 USA〉 : Morgan & Claypool
    UID:
    gbv_165460903X
    Format: Online Ressource (1 PDF (ix, 110 pages))
    Edition: Online-Ausg.
    ISBN: 9781627052665
    Series Statement: Synthesis lectures on information security, privacy, & trust 1945-9750 # 8
    Content: The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as user attitude to easily share private data and activities with strangers. In this book, we discuss three main research topics connected to security in online social networks: (i) trust management, because trust can be intended as a measure of the perception of security (in terms of risks/benefits) that users in an OSN have with respect to other (unknown/little-known) parties; (ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles, but spans across users' social activities and interactions, users must be provided with the possibility to directly control information flows; and (iii) identity management, because OSNs are subjected more and more to malicious attacks that, with respect to traditional ones, have the advantage of being more effective by leveraging the social network as a new medium for reaching victims. For each of these research topics, in this book we provide both theoretical concepts as well as an overview of the main solutions that commercial/non-commercial actors have proposed over the years. We also discuss some of the most promising research directions in these fields
    Note: Part of: Synthesis digital library of engineering and computer science. - Series from website. - Includes bibliographical references (pages 81-108). - Compendex. INSPEC. Google scholar. Google book search. - Title from PDF title page (viewed on January 13, 2014) , System requirements: Adobe Acrobat Reader.
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781627052658
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    b3kat_BV040337062
    Format: 170 S. , 24 cm
    ISBN: 9788896026663
    Series Statement: Biblioteca del Rinascimento e del barocco 3
    Note: Giambattista Marino (1569-1625). - C. Carminati teaches at the Univ. of Bergamo. - Includes bibliographical references
    Language: Italian
    Keywords: Marino, Giambattista 1569-1625
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_776794361
    Format: 1 Online-Ressource (122 Seiten)
    Edition: Also available in print
    ISBN: 9781627052665
    Series Statement: Synthesis Lectures on Information Security, Privacy, and Trust #8
    Content: The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as user attitude to easily share private data and activities with strangers. In this book, we discuss three main research topics connected to security in online social networks: (i) trust management, because trust can be intended as a measure of the perception of security (in terms of risks/benefits) that users in an OSN have with respect to other (unknown/little-known) parties; (ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles, but spans across users' social activities and interactions, users must be provided with the possibility to directly control information flows; and (iii) identity management, because OSNs are subjected more and more to malicious attacks that, with respect to traditional ones, have the advantage of being more effective by leveraging the social network as a new medium for reaching victims. For each of these research topics, in this book we provide both theoretical concepts as well as an overview of the main solutions that commercial/non-commercial actors have proposed over the years. We also discuss some of the most promising research directions in these fields
    Content: 1. Online social networks and security issues -- 1.1 Introduction -- 1.2 Social networks -- 1.2.1 The meaning of community -- 1.2.2 From offline to online communities -- 1.3 Online social networks -- 1.3.1 Evolution of online social networks -- 1.3.2 Analysis and properties -- 1.3.3 Multiple social ties and social capital -- 1.4 Security issues in online social networks -- 1.4.1 Trust management in online social networks -- 1.4.2 Controlled information sharing in online social networks -- 1.4.3 Identity management in online social networks --
    Content: 2. Trust management in online social networks -- 2.1 Introduction -- 2.2 Trust in computer science -- 2.2.1 Trust and policies -- 2.2.2 Trust and reputation systems -- 2.3 Trust in online social networks -- 2.3.1 Trust properties -- 2.3.2 Trust components -- 2.3.3 Social trust and social capital -- 2.3.4 Trust evaluation models -- 2.4 Conclusions --
    Content: 3. Controlled information sharing in online social networks -- 3.1 Introduction -- 3.2 Access control in data management systems -- 3.2.1 A brief historical perspective -- 3.2.2 Access control models -- 3.3 Access control in online social networks -- 3.3.1 Relationship-based access control -- 3.3.2 Privacy settings in commercial online social networks -- 3.3.3 Existing access control approaches -- 3.4 Conclusions --
    Content: 4. Identity management in online social networks -- 4.1 Introduction -- 4.2 Identity management -- 4.2.1 Digital identity -- 4.2.2 Identity management models: from identity 1.0 to identity 2.0 -- 4.3 Identity management in online social networks -- 4.3.1 Identity as self-presentation -- 4.3.2 Identity disclosure -- 4.3.3 Identity theft -- 4.4 Conclusions --
    Content: 5. Conclusions and further research directions -- 5.1 Open security issues in online social networks -- 5.1.1 Trust management -- 5.1.2 Controlled information sharing -- 5.1.3 Identity management -- Bibliography -- Authors' biography
    Note: Description based upon print version of record , Acknowledgments; Online Social Networks and Security Issues; Introduction; Social Networks; The Meaning of Community; From Offline to Online Communities; Online Social Networks; Evolution of Online Social Networks; Analysis and Properties; Multiple Social Ties and Social Capital; Security Issues in Online Social Networks; Trust Management in Online Social Networks; Controlled Information Sharing in Online Social Networks; Identity Management in Online Social Networks; Trust Management in Online Social Networks; Introduction; Trust in Computer Science; Trust and Policies , Trust and Reputation SystemsTrust in Online Social Networks; Trust Properties; Trust Components; Social Trust and Social Capital; Trust Evaluation Models; Conclusions; Controlled Information Sharing in Online Social Networks; Introduction; Access Control in Data Management Systems; A Brief Historical Perspective; Access Control Models; Access Control in Online Social Networks; Relationship-Based Access Control; Privacy Settings in Commercial Online Social Networks; Existing Access Control Approaches; Conclusions; Identity Management in Online Social Networks; Introduction; Identity Management , Digital IdentityIdentity Management Models: From Identity 1.0 to Identity 2.0; Identity Management in Online Social Networks; Identity as Self-Presentation; Identity Disclosure; Identity Theft; Conclusions; Conclusions and Further Research Directions; Open Security Issues in Online Social Networks; Trust Management; Controlled Information Sharing; Identity Management; Bibliography; Authors' Biography , Also available in print. , System requirements: Adobe Acrobat Reader. , Mode of access: World Wide Web.
    Additional Edition: ISBN 9781627052658
    Additional Edition: Print version Security and Trust in Online Social Networks
    Language: English
    Keywords: Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages