Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Region
Library
Virtual Catalogues
Access
  • 1
    UID:
    almafu_BV002237146
    Format: 831 S. : , Ill.
    Uniform Title: The nemesis of power
    Language: German
    Subjects: History , Political Science
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Wehrmacht ; Politik ; Reichswehr ; Politik ; Militär ; Politik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    Berlin :Kongress-Verl.,
    UID:
    almafu_BV026340757
    Format: 275 S.
    Language: German
    Subjects: History
    RVK:
    Keywords: Entnazifizierung ; Außenpolitik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Washington D.C. :World Bank,
    UID:
    almahu_9949191329802882
    Format: xiii, 211 pages ; , 23 cm.
    ISBN: 0821350730
    Series Statement: World Bank e-Library.
    Additional Edition: Print Version: ISBN 9780821350737
    Language: English
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949602262502882
    Format: 1 online resource (515 pages)
    Edition: 1st ed.
    ISBN: 9781484228968
    Note: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Additional Edition: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin Heidelberg :
    UID:
    almahu_9947921589302882
    Format: VII, 266 p. , online resource.
    ISBN: 9783540374855
    Series Statement: Lecture Notes in Mathematics, 454
    Note: Existentially complete structures and existentially universal structures -- Model-completions and model-companions -- Infinite forcing in model theory -- Approximating chains for -- Finite forcing in model theory -- Axiomatizations -- Forcing and recursion theory -- Existentially complete models -- Simple models and R.E. ultrapowers -- Regular models -- Regular models and second order models for arithmetic -- Generic models and the analytic hierarchy -- Applications to complete extensions of peano's arithmetic -- Existentially complete division rings -- Nullstellensatz -- Classes of existentially complete division algebras.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540071570
    Language: English
    Subjects: Mathematics
    RVK:
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almafu_BV021934645
    Format: 384 S.
    ISBN: 3-550-07317-8
    Note: Aus dem Engl. übers. , Zugl.: Pittsburgh, Pa., Univ., Diss., 1970 u.d.T.: Wheeler, Robert F.: Socialist Internationalism in a revolutionary epoch: The USPD and the crisis of the Internationale
    Language: German
    Subjects: History , Political Science
    RVK:
    RVK:
    Keywords: Sozialismus ; Hochschulschrift ; Hochschulschrift
    Author information: Wheeler, Robert F. 1940-1977
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Book
    Book
    London [u.a.] :Routledge,
    UID:
    almafu_BV025307133
    Format: VI, 356 S. : , Ill.
    Edition: 1. publ.
    ISBN: 0-415-27787-6 , 0-415-27786-8
    Series Statement: In Focus: Routledge film readers
    Language: English
    Subjects: General works
    RVK:
    RVK:
    Keywords: Experimentalfilm ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almafu_BV004454966
    Format: 257 S. : zahlr. Ill., graph. Darst.
    ISBN: 3-89330-815-6
    Series Statement: Spektrum-Bibliothek 30
    Uniform Title: A journey into gravity and spacetime
    Language: German
    Subjects: Physics
    RVK:
    RVK:
    Keywords: Gravitation ; Raum-Zeit ; Relativitätstheorie ; Raum ; Zeit ; Allgemeine Relativitätstheorie ; Gravitationstheorie ; Einführung ; Einführung ; Einführung ; Einführung ; Einführung ; Einführung ; Einführung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_BV002277221
    Format: VII, 108 S. : , Ill., graph. Darst.
    Language: German
    Subjects: Physics , Theology
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Geometrodynamik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    b3kat_BV040617594
    Format: 1 Online-Ressource (1 online resource (48 p.))
    Edition: Online-Ausgabe World Bank E-Library Archive Sonstige Standardnummer des Gesamttitels: 041181-4
    Content: Environmental degradation can inflict serious damage on poor people because their livelihoods often depend on natural resource use and their living conditions may offer little protection from air, water, and soil pollution. At the same time, poverty-constrained options may induce the poor to deplete resources and degrade the environment at rates that are incompatible with long-term sustainability. In such cases, degraded resources may precipitate a downward spiral, by further reducing the income and livelihoods of the poor. This "poverty/environment nexus" has become a major issue in the recent literature on sustainable development. In regions where the nexus is significant, jointly addressing problems of poverty and environmental degradation may be more cost-effective than addressing them separately. Empirical evidence on the prevalence and importance of the poverty/environment nexus is sparse because the requisite data are often difficult to obtain in developing countries. The authors use newly available spatial and survey data to investigate the spatial dimension of the nexus in Cambodia, and Lao People's Democratic Republic. The data enable the authors to quantify several environmental problems at the district and provincial level. In a parallel exercise, they map the provincial distribution of poor households. Merging the geographic information on poverty and the environment, the authors search for the nexus using geo-referenced indicator maps and statistical analysis. The results suggest that the nexus is country-specific: geographical, historical, and institutional factors may all play important roles in determining the relative importance of poverty and environment links in different contexts. Joint implementation of poverty and environment strategies may be cost-effective for some environmental problems, but independent implementation may be preferable in many cases as well. Since the search has not revealed
    Note: Weitere Ausgabe: Dasgupta, Susmita: The Poverty/Environment Nexus in Cambodia and Lao People's Democratic Republic
    Additional Edition: Reproduktion von Dasgupta, Susmita, 1961- The Poverty/Environment Nexus in Cambodia and Lao People's Democratic Republic 2003
    Language: English
    URL: Volltext  (Deutschlandweit zugänglich)
    Author information: Meisner, Craig
    Author information: Dasgupta, Susmita 1961-
    Author information: Wheeler, David 1946-
    Author information: Deichmann, Uwe 1963-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages