Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Access
  • 1
    Online Resource
    Online Resource
    New York, NY :Association for Computing Machinery, ; 1.1979 -
    UID:
    almahu_BV013389551
    Format: Online-Ressource.
    ISSN: 1558-4593
    Note: Gesehen am 12.11.19
    Additional Edition: Erscheint auch als Druck-Ausgabe Association for Computing Machinery ACM transactions on programming languages and systems New York, NY : Assoc., 1979- ISSN 0164-0925
    Former: Darin aufgeg. Association for Computing Machinery ACM letters on programming languages and systems
    Language: English
    Keywords: Programmiersprache ; Zeitschrift ; Online-Ressource ; Zeitschrift ; Zeitschrift ; Zeitschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Washington, DC :World Bank,
    UID:
    almafu_9958066455702883
    Format: xii, 209 pages : , illustrations ; , 26 cm.
    Edition: 1st ed.
    ISBN: 1-280-08516-9 , 9786610085163 , 0-8213-5827-8
    Series Statement: A World Bank country study
    Note: Bibliographic Level Mode of Issuance: Monograph , Intro -- TABLE OF CONTENTS -- Acknowledgments -- Abbreviations -- EXECUTIVE SUMMARY -- PART I: OVERVIEW AND POLICY OPTIONS -- A Configuration of "Bandwagon" Reforms Could Make a Difference -- The Big Picture: Past and Present -- Growth and Poverty Reduction -- Understanding Growth in Jamaica -- Reducing the Fiscal and Debt Burden -- Revitalizing the Financial System -- Improving Education Outcomes -- Crime and Its Impact on Business -- Improving Jamaica's International Competitiveness -- PART II: MAIN REPORT -- 1. Growth and Poverty Reduction in Jamaica -- Poverty Incidence and Income Inequality -- Who are the Poor? -- Rural vs. Urban Poverty -- Poverty Reduction with No Growth: "The Paradox of the 1990s" -- Summary and Issues for the Future -- 2. Understanding Growth in Jamaica -- Slow Growth, High Investment, Low Employment Generation -- The Supply Side of Growth -- Jamaica's GDP Growth May Be Underestimated -- Capital Inputs -- The Labor Force and Growth -- Raising Growth in Jamaica -- 3. Reducing the Fiscal and Debt Burden -- The Government Budget -- Towards Sustainable Debt -- Reducing and Improving Government Expenditure -- Raising Revenue: Taxer and User Fees -- Fiscal Institutions and Governance -- 4. Revitalizing Jamaica's Financial System -- The Causes of Jamaica's Financial Crisis -- Dealing with the Crisis -- Results of the Crisis Revolution -- The Debt Overhang and Its Effects -- The Post-Crisis Improvement in Financial Sector Regulation, Supervision, and the Solvency Issue -- 5. Improving Education Outcomes -- The International Evidence on Private and Social Returns to Education -- Progress in Education Coverage, But Quality Suffered -- Social Returns to Education -- Inequality, Poverty, and Student Achievement -- Outcomes and Public Expenditure -- What Has Been Done and What More Can Be Done?. , 6. Crime and its Impact on Business in Jamaica -- Governance in Jamaica: the International Context -- Dimension and Trends in Crime in Jamaica -- Patterns of Criminal Victimization of Jamaican Firms -- The Economic Costs of Crime -- Policy Options -- 7. Improving Jamaica's International Competitiveness -- Evolution of Trade in Jamaica 1998-2001 -- Trade Policy Reforms -- Has Jamaica Reaped the Full Gains From Trade -- The Decline in Competitiveness in the 1990s -- Jamaica's Business Environment for Exports -- The Performance in Tourism -- Decline in the Apparel Sector Reflects the Decline in Competitiveness -- Impending Issues in the International Trade Agenda -- Improving the Framework for Exports and Development -- Annexes -- Annex A: Identifying the Determinants of Crime -- Annex B: Methodology for Business Victimization Survey -- Annex C: Case of Service Station near Montego Bay -- Annex D: Case of Furniture Manufacturing Firm in Kingston Metropolitan Area -- Annex E: Program DESEPAZ, Desarrollo, Seguridad y Paz (Development, Security and Peace) in Cali, Colombia -- Annex F: Police and Community Cooperation for Reduction of Violence in Diadema, Sao Paulo, Brazil -- Annex G: Citizen Culture in Bogota (Cultura Ciudadana en a la Alcadia de Bogota), Bogota, Colombia -- Annex H: Focus on Youth: the Model of the City of Boston, Massachussets, USA -- Annex Tables -- Bibliography -- TABLES -- 1: Jamaica-Selected Economic and Social Indicators, 1980-2001 -- 2: Jamaica-Millenium Development Goals, Achievements and 2015 Target -- 3: Jamaica-GDP Growth, Employment Growth and Investment Rates: 1981-2001 -- 4: Jamaica-Indicators of Consumption (Average Annual Growth Rates) -- 5: Primary Surplus/Deficit (% of GDP) Required to Stabilize the Stock of Public Debt -- 6: The Annual Economic Cost of Crime, 2001 -- 7: Impact of Crime on Business Practice (%). , 1.1: Consumption of the Poor, 1958-1988 -- 1.2: Poverty and Social and Economic Indicators -- 1.3: Poverty in Rural and Urban Areas (percent of population) -- 1.4: Movement in Average Wages and Earnings Compared to Increase in CPI -- 1.5: Factor Income Share -- 1.6: Jamaica CPI Annual Index and Relative Price of Food -- 1.7: Private Remittance Inflows (US millions) -- 2.1: Jamaica-GDP Growth, Employment Growth and Investment Rates: 1981-2001 -- 2.2: Jamaica Estimates of Sources of Growth 1991-2000 -- 2.3: Jamaica: The Rise in Currency Holdings, 1991-2000 -- 2.4: Jamaica: Labor Force Indicators, 1991-2000 -- 3.1: Jamaica Fiscal Operations, 1992/93-2002/03 -- 3.2: Jamaica-Domestic and External Debt, and Structure of External Debt, 1991/92-2001/02 -- 3.3: Primary Surplus/Deficit (% of GDP) Required to Stabilize the Stock of Public Debt -- 3.4: Jamaica Public Sector Investment Program, 2000/01-2003/04 -- 3.5: Government Revenues/GDP, Selected Countries, 2000 -- 3.6: Fiscal Risk Matrix -- 4.1: Jamaica's Financial System, 1990, 1995, and 2001 -- 4.2: Jamaica-Fixed Capital Formation and Growth, 1986-2001 -- 4.3: Government Net Credit Stock/Deposits, Banks, 2000 -- 5.1: Returns to Education of Male Immigrants in USA by Country of Birth -- 5.2: Enrollment by School Type in Secondary and Tertiary Education by Consumption Quintile (%), 2000 -- 5.3: Highest Examination Passed by Population 14 Years and Over Not Enrolled in School/Educational Institution (%), 2001 -- 6.1: International Comparisons of Selected Governance Indicators, 2002 -- 6.2: Victimization by Sector in which Firm is Located and Type of Crime -- 6.3: Reporting and Reporting Outcomes (% of Total Cases) -- 6.4: Distribution of Respondents by Selected Measures Taken to Protect Against Crime and Nature of Organization (%) -- 6.5: Annual Impact of Crime, Summary. , 6.6: The Annual Economic Cost of Crime, 2001 -- 6.7: Impact of Crime on Business Practice (%) -- 7.1: Export and Import Growth in Jamaica -- 7.2: Merchandise Trade and Exchange Rates in Jamaica's Economy -- 7.3: Competitiveness Rankings for Jamaica and Neighboring Countries, 2001 -- ANNEX TABLES -- A1.1: Jamaica-Consumer Price Inflation, 1990-2002 -- A2.1: Jamaica-Main Aggregates of GDP, 1990-2001 -- A2.2: Jamaica-GDP by Industrial Sectors, current J, 1990-2001 -- A2.3: Jamaica-GDP by Industrial Sectors, constant J, 1990-2001 -- A2.4: Jamaica-GDP by Industrial Sectors, % growth, 1990-2001 -- A2.5: Growth Accounting Adjusting for Human Capital, 1961-2000 -- A2.6: Jamaica-Determinants of Change in GDP Per Capita -- A2.7: Jamaica-Labor Force and Employment by Industry Group and Labor Status (¢000), Annual Average -- A3.1: Jamaica-Non-financial Public Sector Debt -- A3.2: Jamaica-External Public Debt Outstanding -- A3.3: Jamaica-Central Government Revenues and Grants, 1996/97-2002/03 (% of GDP) -- A6.1: Crime Rate Indices for Jamaica, 1970-2001 -- A6.2: Jamaica and New York : Murder Rates for 100,000, 1970-2000 -- A6.3: Murder Rates by County and Parish, 1984-2001 -- A7.1a: Jamaica's Major Exports and Imports (US million) -- A7.1b: Jamaica's Major Exports and Imports (% of exports) -- A7.2: Jamaica: Balance of Payments Summary -- A7.3: Foreign Direct Investment in Jamaica (US million), 1998-01 -- BOXES -- 1.1: Measurement of Poverty in Jamaica -- 2.1: Consumption Indicators -- 3.1: A Tale of Two Privatizations -- 3.2: The Budget Process -- 6.1: Construction Firm in Kingston Metropolitan Area -- 7.1: The Impact of an Appreciated Exchange Rat -- 7.2: The Pass Through from the Exchange Rate to Prices -- 7.3: Inadequate Infrastructure Limits Investments, Competitiveness and Growth -- 7.4: The Decline of the La Moda Garment Company -- FIGURES. , 1: Jamaica-Poverty Head Count -- 2: Jamaica: Poverty Head Count Actual and Regression Prediction -- 3: Jamaica: Fiscal Revenue and Expenditures by Type, 1991/92-2002/03 -- 4: Jamaica: Total Public Sector Debt to GDP -- 5: Jamaica: Bank Credit to the Public and Private Sectors, 1994-2002 -- 6: GDP Growth and Total Debt (% GDP) in 86 Countries -- 7: School Enrollment by Age and Consumption Quintile, 2000 -- 8: Lorenz Curve Distribution of Public Recurrent Expenditure by Level of Education and by Consumption Quintile, 2000 -- 9: Jamaica's International Ranking on Selected Governance Indicators, 2002/2003 -- 10: As its REER Appreciated, Jamaica's Share of Exports in GDP Declined -- 11: . . . and as its Share in World Exports Fell -- 1.1: Jamaica: Poverty Head Count (% of Population) -- 1.2: Poverty (%), Annual Inflation (% p.a.) and Annual GDP Growth (% p.a.) -- 1.3: Jamaica Poverty Head Count: Actual and Regression Prediction -- 3.1: Jamaica: Fiscal Revenue and Expenditures by Type, 1991/92-2002/03 -- 3.2: Jamaica: Total Public Sector Debt to GDP -- 4.1: Fiscal Cost of Banking Crisis (as Percentage of GDP) -- 4.2: Real GDP in Selected Crisis Countries, (First Crisis Year = 100) -- 4.3: Jamaica: Bank Credit to the Public and Private Sectors 1994-2002 -- 4.4: GDP Growth and Total Debt (% GDP) -- 4.5: Commercial Bank Loan Rates and Inflation, End June -- 5.1: School Quality According to Employers' Appraisal -- 5.2: School Enrollment by Age and Consumption Quintile, 2000 -- 5.3: Percent Correct in Mathematics, Junior High School Certificate Examination, 1997-2000 -- 5.4: Percent Correct in Language, Junior High School Certificate Examination, 1997-2000 -- 5.5: Percentage of Eligible Cohort Taking CXC, 2001 -- 5.6: Percentage of Total Passes of CXC Candidates, 2001 -- 5.7: CXC Performance in 9 Caribbean Countries. , 5.8: English CXC Passing Rate (%) and Class Hours in Eight Caribbean Countries. , English
    Additional Edition: ISBN 0-8213-5826-X
    Language: English
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almafu_9958078509602883
    Format: xliii, 651 pages : , illustrations ; , 23 cm.
    Edition: 1st ed.
    ISBN: 1-280-08512-6 , 9786610085125 , 0-585-49509-2
    Series Statement: World Bank e-Library.
    Note: Bibliographic Level Mode of Issuance: Monograph , Intro -- Contents -- Preface -- Acknowledgments -- Abbreviations and Acronyms -- Executive Summary -- Chapter 1 Introduction -- I Political, Legal, and Financial Framework -- Chapter 2 Fiscal Devolution -- Chapter 3 Market Setting and Legal Framework -- II Borrowing Instruments and Restrictions on Their Use -- Chapter 4 Subnational Governments as Borrowers -- Chapter 5 The Nature and Design of Debt -- Chapter 6 Debt Instruments and Methods of Sale -- Chapter 7 Restrictions on the Issuance and Use of Subsovereign Debt -- III Characteristics of Financial Market Regulation and Disclosure -- Chapter 8 Financial Market Structure, Regulation, and Operations -- Chapter 9 Disclosure and Financial Reporting -- IV Evaluating, Monitoring, and Assisting Subnational Governments -- Chapter 10 Credit Analysis and Credit Ratings -- Chapter 11 Monitoring and Intervening in Subnational Government Finances -- Chapter 12 Designing and Implementing Credit Assistance to Subnational Governments -- V Policy Guidelines -- Chapter 13 Concluding Observations and Policy Guides -- VI Country Case Studies -- Latin America and the Caribbean -- Chapter 14 Argentina -- Chapter 15 Brazil -- Chapter 16 Colombia -- Chapter 17 Mexico -- Sub-Saharan Africa -- Chapter 18 South Africa -- Chapter 19 Zimbabwe -- Middle East and North Africa -- Chapter 20 Morocco -- Chapter 21 Tunisia -- Asia -- Chapter 22 People's Republic of China -- Chapter 23 Republic of Korea -- Chapter 24 India -- Chapter 25 Indonesia -- Chapter 26 The Philippines -- Eastern and Central Europe -- Chapter 27 Bulgaria -- Chapter 28 Czech Republic -- Chapter 29 Hungary -- Chapter 30 Poland -- Chapter 31 Russian Federation -- Bibliography -- Index -- Boxes -- 2.1. Devolving Responsibility for Elementary School Teachers' Salaries in Romania -- 2.2. Rio and the International Marketplace. , 3.1. Banks and Securities Markets: Are Both Needed for Development? -- 3.2. Brazilian Banks' Excessive Concentration in Government Securities -- 4.1. Defining and Controlling Public Debt -- 4.2. China: Off-Budget Finance and the Transmuted Bond -- 4.3. Restructuring Subnational Government: From Few to Many (But How Many?) -- 5.1. Importance of the Rate-Setting Pledge -- 5.2. Intergovernmental Transfer Payments as Collateral -- 5.3. Importance of Feasibility Reports: The San Pedro Sula, Honduras, Sports Complex -- 6.1. Selecting an Underwriter through Competitive Negotiation -- 6.2. Rigging a City's Bond Sale -- 7.1. The Philippines: How Political Risks Can Inhibit Municipal Credit Markets -- 7.2. Examples of Language on the Binding Nature of Financial Obligations -- 7.3. The City of Cebu in the Philippines Considers a Deal -- 7.4. Johannesburg Comes Up Short -- 7.5. Example of Language Denying Central Government Responsibility for Municipal Debt -- 7.6. Example of Language on Securing Debt with Own Revenues -- 8.1. Commercial Banking in Transitioning Economies -- 8.2. The Bank for International Settlements' Reserve Requirements and Capital Rules -- 8.3. What Is a Security? -- 8.4. After 60 Years, Municipal Bonds Return to Romania -- 9.1. Disclosure over the Internet -- 9.2. Accounting for Accounting Differences -- 9.3 Why Did Czech Municipal Debt Grow So Fast? -- 10.1. Emerging Market Ratings and Bond Insurance -- 11.1. Example of Information Provided in the Debt Annex of French Subnational Government Budgets -- 11.2. In Argentina Trustees Make a Difference -- 11.3. Debt Adjustment and Subnational Insolvency in Hungary -- 11.4. Financial Stabilization to Address Subnational Bankruptcy in Latvia -- 12.1. The Subnational Government Retreat from the Private Credit Market in the Czech Republic. , 12.2. Moving from Soft to Hard Credit through Enforcement of Loan Collections: South Africa's Experience -- 12.3. The Philippine Local Government Unit Guarantee Corporation -- 12.4. The Tamil Nadu Urban Development Fund, India -- 12.5. Assisting Small Bond Issuers: The Bond Bank Option -- 12.6. A Brief Illustration of Grant-Loan Integration: An Example from Indonesia -- 18.1. A South African Parable -- 24.1. Recent Projects Financed by the Tamil Nadu Urban Development Fund -- 24.2. Basis for the AA+ Rating of the Madurai Municipal Corporation Bond Issue -- Figures -- 3.1. Market Structures and Sources of Capital for Local Government Borrowing -- 3.2. Stages of Development in Credit Market Access -- 4.1. General Government Obligation -- 4.2. Government Limited Obligation -- 4.3. Public-Private Project Financing -- 4.4. Matrix of Subnational Government Financing Capacity -- 6.1. Debt Service Structures -- 12.1. Retail On-Lending by the Government Financing Institution -- 12.2. Wholesale On-Lending by the Government Finance Institution -- 12.3. Securitization of a Loan Pool -- 12.4. Mechanics of a Liquidity Facility -- 14.1. Distribution of Shareable Taxes under the Coparticipation Scheme, Argentina -- 14.2. Relative Fiscal and Debt Situations of Provinces, Argentina, 2001 -- 14.3. Provincial Indebtedness by Type of Debt or Lender, Argentina, December 2001 -- 14.4. Impact of the Devaluation on Provincial Debt, Argentina -- 14.5. Disbursement of Coparticipation Revenues, Argentina -- 14.6. Provincial Bond Debt Outstanding by Type, Argentina, End of 2001 -- 14.7. Flow of Funds for the Salta Hydrocarbon Royalty Trust Bonds -- 14.8. Selected Debt Indicators, Salta and All Provinces, End-2001 -- 14.9. Selected Debt Indicators, City of Buenos Aires and All Provinces, End-2001 -- 14.10. Selected Debt Indicators, Buenos Aires and All Provinces, End-2001. , 15.1. Distribution of the Debt Stock in Bonds by State, Brazil, End-1996 -- 15.2. Subnational Debt as a Share of GDP, Brazil, 1998-2002 -- 16.1. Fiscal Balance as a Share of Total Revenue by Department, Colombia, 2000 -- 16.2. Direct Subnational Debt, Colombia, 1996-2001 -- 16.3 Allocation of Credit from Findeter 1989-99 -- 16.4. Debt Stock, Capital District of Santa Fe de Bogotá, 1995-2001 -- 16.5. Debt Service, Capital District of Santa Fe de Bogotá, 1995-2001 -- 17.1. Borrowing by Three State Governments, Mexico, 1994-98 -- 18.1. Outstanding Municipal Debt, South Africa, 1997-2000 -- 18.2. Outstanding Municipal Debt by Form, South Africa, 1997-2000 -- 22.1. Typical Cooperative Joint Venture Arrangement for Expressway Development -- 24.1. Funding Approvals and Disbursements by the Tamil Nadu Urban Development Fund by Sector, as of 31 March 1999 -- 24.2. Value of Capital Works Executed by Municipalities with Funding from the Tamil Nadu Urban Development Fund, 1993/94 to 1998/99 -- 24.3. Simplified Flow of Funds in the Pooled Financing Scheme -- 27.1. Local Government Expenditure as a Share of GDP, Selected Countries, Various Years, 1998-2002 -- 28.1. Municipal Debt Outstanding, Czech Republic, 1993-99 -- 28.2. Local Fiscal Deficits, Czech Republic, 1993-2000 -- 28.3. Composition of Municipal Debt Outstanding, Czech Republic, 1993-99 -- 28.4. Average Composition of Municipal Debt Outstanding, Czech Republic, 1998-99 -- 29.1. Sources of Local Government Revenue, Hungary, 1995-2000 -- 30.1. Own-Source Revenue as a Share of Total Revenue, Szczecin, 1998-2002 -- 30.2. Local Government Debt by Source, Poland, 1999-2001 -- 30.3. Concepts of Surplus from Operating Revenues as a Source of Funds for Capital Spending -- 30.4. Structure of Operating Revenue, Wroclaw, 2001 -- 30.5. Budget and Debt, Wroclaw, 1996-2002. , 30.6. Structure of Operating Expenditure, Lodz, 2001 -- 30.7. Budget and Debt, Lodz, 1996-2002 -- 30.8. Debt Burden as a Share of Operating Revenue, Lodz, 1996-2002 -- 30.9. Budget Balance and Debt, Szczecin, 1998-2002 -- 30.10. Debt and Debt Service as a Share of Operating Revenue, Szczecin, 1996-2002 -- 30.11. Budget and Debt, Krakow, 1998-2002 -- 31.1. Administrative Structure for Executing the Debt Strategy, St. Petersburg -- Tables -- 7.1. Municipal Debt Limitations in Selected Eastern and Central European Countries -- 10.1. Credit Rating Volatility in Asia: Selected Standard and Poor's Long-Term Foreign Currency Sovereign Ratings -- 14.1. Allocation of Responsibilities among Levels of Government, Argentina -- 14.2. Terms and Conditions of the Typical Consolidation Bond, Argentina -- 14.3. Provincial Bond Issues in Domestic and International Capital Markets, Argentina, 1994-2001 -- 14.4. Features of the Bond Issue by the Salta Hydrocarbon Royalty Trust -- 14.5. Debt by Source, Salta, 1995-2001 -- 14.6. Key Features of the Bond Program of the City of Buenos Aires -- 14.7. Main Characteristics of the Bond Issues by the City of Buenos Aires -- 14.8. Debt by Source, City of Buenos Aires, 1995-2001 -- 14.9. Access to the Bond Market by the Province of Buenos Aires, 1994-2001 -- 14.10. Debt by Source, Province of Buenos Aires, 1995-2001 -- 15.1. Municipal Sources of Funds, Brazil, 1999 -- 16.1. The "Traffic Light" System for Regulating Subnational Borrowing, Colombia -- 16.2. Potential Borrowers from Findeter -- 16.3. Terms and Conditions of Findeter Loans -- 16.4. Features of the Bond Issue by the Capital District of Santa Fe de Bogotá -- 16.5. Revenues and Expenditures, Capital District of Santa Fe de Bogotá, 1995-2001 -- 17.1. Spending and Own-Source Revenues as a Share of GDP by Level of Government, Mexico, Selected Years, 1991-97. , 17.2. Subnational Bond Issues, Mexico, 2002. , English
    Additional Edition: ISBN 0-8213-5464-7
    Language: English
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_BV013793725
    Format: Online-Ressource.
    Note: Gesehen am 05.09.12
    Additional Edition: Erscheint auch als Druck-Ausgabe International Conference on Architectural Support for Programming Languages and Operating Systems Proceedings / International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS ...) Washington, DC : Computer Soc. Pr. [u.a.], 1987-1989
    Language: English
    Keywords: Zeitschrift ; Konferenzschrift ; Zeitschrift ; Konferenzschrift ; Zeitschrift ; Konferenzschrift ; Zeitschrift ; Konferenzschrift ; Zeitschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_BV013389649
    Format: Online-Ressource.
    ISSN: 1557-7384
    Series Statement: ACM digital library
    Note: Gesehen am 11.06.2020
    Additional Edition: Erscheint auch als Druck-Ausgabe Association for Computing Machinery ACM letters on programming languages and systems New York, NY : ACM Press, 1992-1993 ISSN 1057-4514
    Later: Aufgeg. in Association for Computing Machinery ACM transactions on programming languages and systems
    Language: English
    Keywords: Programmiersprache ; Zeitschrift ; Online-Ressource ; Zeitschrift ; Zeitschrift ; Zeitschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949602262502882
    Format: 1 online resource (515 pages)
    Edition: 1st ed.
    ISBN: 9781484228968
    Note: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Additional Edition: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Springer Nature | Cham :Springer International Publishing AG,
    UID:
    almafu_9959770777202883
    Format: 1 online resource (437 pages)
    ISBN: 3-030-60406-3
    Content: This Open Access book explains that after long periods of prehistoric research in which the importance of the archaeological as well as the natural context of rock art has been constantly underestimated, research has now begun to take this context into focus for documentation, analysis, interpretation and understanding. Human footprints are prominent among the long-time under-researched features of the context in caves with rock art. In order to compensate for this neglect an innovative research program has been established several years ago that focuses on the merging of indigenous knowledge and western archaeological science for the benefit of both sides. The book gathers first the methodological diversity in the analysis of human tracks. Here major representatives of anthropological, statistical and traditional approaches feature the multi-layered methods available for the analysis of human tracks. Second it compiles case studies from around the globe of prehistoric human tracks. For the first time, the most important sites which have been found worldwide are published in a single publication. The third focus of this book is on firsthand experiences of researchers with indigenous tracking experts from around the globe, expounding on how archaeological sciencecan benefit from the ancestral knowledge. This book will be of interest to professional archaeologists, graduate students, ecologists, cultural anthropologists and laypeople, especially those focussing on hunting-gathering and pastoralist communities and who appreciate indigenous knowledge.
    Note: Intro -- Foreword -- Preface -- Acknowledgments -- Contents -- Chapter 1: Introduction -- Examples of Indigenous Spoor Interpretation -- On this Book -- References -- Part I: Methodological Diversity in the Analysis of Human Tracks -- Chapter 2: Inferences from Footprints: Archaeological Best Practice -- Introduction -- Digital Capture, Documentation and Stratigraphic Context -- Analytical Tools in Ichnology -- Types of Inference from Human Footprints -- Anatomical Inferences -- Biomechanical Inferences -- Palaeobiological Inferences -- Faunal Sampling -- Problems of Co-association -- Conclusions -- References -- Chapter 3: Repetition Without Repetition: A Comparison of the Laetoli G1, Ileret, Namibian Holocene and Modern Human Footprint... -- Introduction -- Methods -- Results and Interpretations -- Discussion -- Conclusion -- Supplementary Material -- Detailed Materials and Methods -- Additional Footprint Discussion -- References -- Chapter 4: Reproduce to Understand: Experimental Approach Based on Footprints in Cussac Cave (Southwestern France) -- Introduction -- The Karst Setting -- Formation -- Preservation Context -- Cussac Cave -- Contextual Setting -- Tracks at Cussac and Taphonomy -- Materiel and Methods -- Experimental Protocol -- Descriptions, Metrics and 3D Models -- Results -- Formation Sediment and Flooding Sediment Load -- Formation Sediment -- Flooding Sediment Load -- General Morphology -- Topography -- Original Experimental Footprints -- Footprint Evolution -- Discussion -- Conclusion -- References -- Chapter 5: Experimental Re-creation of the Depositional Context in Which Late Pleistocene Tracks Were Found on the Pacific Coa... -- Introduction -- Methods -- Results -- Discussion and Conclusions -- References -- Chapter 6: Reading Spoor -- Introduction -- The Art of Tracking -- Methodological Aspects of Tracking. , Implications for the Archaeology of Prehistoric Human Tracks -- The Wider Potential of Tracking -- Conclusion -- References -- Part II: Case Studies from Around the Globe -- Chapter 7: Perspectives on Pliocene and Pleistocene Pedal Patterns and Protection -- Introduction -- The Tarsometatarsal Skeletons -- The Hallux -- The Lateral Metatarsophalangeal Articulations -- Lateral Proximal Phalanx Lengths and Shafts -- Proximal Pedal Phalanx Diaphyseal Hypertrophy -- Implications for Pliocene and Pleistocene Footprints -- References -- Chapter 8: Frozen in the Ashes -- Forty Years of Research at Laetoli -- The Discovery of Laetoli Site S -- Survey of Laetoli Site S: A Case Study for Photogrammetry Application in Extreme Environments -- Laetoli Site S Footprints: Results and Implications -- Laetoli Footprints: Perspectives -- References -- Chapter 9: Steps from History -- Introduction -- Background to Happisburgh -- Happisburgh Site 3 -- The Footprint Surface -- Implications of the Happisburgh Footprints -- Impact of the Happisburgh Footprints -- Conclusion -- References -- Chapter 10: Reconsideration of the Antiquity of the Middle Palaeolithic Footprints from Theopetra Cave (Thessaly, Greece) -- Introduction -- Historical Background -- Materials and Methods -- Chronology - Dating -- Archaeology - Lithic Artefacts -- Description of the Footprints -- Results -- Contour Analysis (3D Laser Scanner) -- Sex and Age -- Stature -- Discussion -- Conclusion -- References -- Chapter 11: On the Tracks of Neandertals: The Ichnological Assemblage from Le Rozel (Normandy, France) -- Introduction -- The Neandertal Footprint Record -- The Archaeological Site from Le Rozel -- Material and Methods -- Results -- Preservation and Distribution of the Tracks -- Human Footprints -- Human Handprints -- Animal Tracks -- Discussion -- References. , Chapter 12: Hominin Footprints in Caves from Romanian Carpathians -- Introduction -- Vârtop Cave (Bihor Mountains) -- Room of the Steps and the Vârtop Footprints -- Geochronology -- Ciur Izbuc Cave (Pădurea Craiului Mountains) -- References -- Chapter 13: Episodes of Magdalenian Hunter-Gatherers in the Upper Gallery of Tuc d´Audoubert (Ariège, France) -- Introduction -- Design of the Project -- Participants -- Materials -- The Volp Caves -- The Cave of Tuc d´Audoubert -- Archaeological Context -- Human Tracks -- Methods -- Results -- Galerie des Effondrements -- Galerie des Empreintes -- Western End Section -- Western Centre -- Eastern Centre -- Eastern End Section -- Galerie des Petits Pieds -- Salle des Talons -- Synopsis -- Identity of the Trackmakers -- Identified Events -- Track Details -- Spoor Type, Side and Trackways -- Carrying Additional Weight -- Body Postures and Gait -- Group Configuration -- Axis of Locomotion -- Human Interaction with Cave Bear Bones -- Superimposition of Human Tracks -- General Conditions and Reliability of Identification -- Discussion and Conclusion -- References -- Chapter 14: Following the Father Steps in the Bowels of the Earth: The Ichnological Record from the Bàsura Cave (Upper Palaeol... -- Introduction -- Human Footprints of the Bàsura Cave: Previous Studies -- Geology of the Bàsura Cave -- Ichnology of Bàsura Cave -- Footprints, Handprints, Finger and Human Body Traces -- Finger Flutings -- Clay Pits and Related Finger Traces -- Animal Traces -- Approaches and Methodologies -- High-Resolution Digital Photogrammetry -- 3D Scanning -- Morphometric Analysis -- The Archaeological Approach and New Absolute Dating -- Charcoal Remains and Insights on the Illumination of Caves -- Inferences from Human Tracks and the Reconstruction of a Scenery -- The Human Trackmaker Identikit -- The Exploration of the Cavity. , Bàsura Cave in the Regional Context -- Concluding Remarks -- References -- Chapter 15: Prehistoric Speleological Exploration in the Cave of Aldène in Cesseras (Hérault, France): Human Footprint Paths a... -- Introduction -- A Major Natural Cave for the Heritage -- Exceptional Deposit Conditions -- A Problem of Complementary Study -- The Contribution of the Traces of Torches -- Human Footprints -- The Study of the Human Footprints of the Paul Ambert Gallery -- A New Research Program -- References -- Chapter 16: The Mesolithic Footprints Retained in One Bed of the Former Saltmarshes at Formby Point, Sefton Coast, North West ... -- Introduction -- The Palaeoenvironment -- Previous Studies at Formby Point -- Footprint Formation and Preservation Process -- Blundell Path C -- The Footprints in the Bed -- Context 3, the Lowest Layer -- Context 2, the Middle Layer -- Context 1, the Top Layer -- Activity on the Mudflats -- Faunal Behaviour in the Intertidal Zone -- Humans in the Intertidal Zone -- Experience in the Intertidal Zone -- Evidence of Coastal Occupation -- Hunter-Gatherer-Foragers at Formby -- Conclusion -- References -- Chapter 17: Prehistoric Human Tracks in Ojo Guareña Cave System (Burgos, Spain): The Sala and Galerías de las Huellas -- Introduction -- The Site -- Access to a Complicated Sector -- Materials and Methods -- Footprint Documentation -- Footprints and Trackways -- Estimation of Height and Weight -- Chronology -- Results -- Footprints and Trackways -- Chronology -- Discussion -- Conclusion -- References -- Part III: Experiences with Indigenous Experts -- Chapter 18: Tracking with Batek Hunter-Gatherers of Malaysia -- Introduction -- Ethnographic Background -- Tracking Habitats -- Hunting, Animals, Tracks -- Encountering Forest Tracks -- Simple, Systematic, and Speculative Tracking -- Discussion -- References. , Chapter 19: Identify, Search and Monitor by Tracks: Elements of Analysis of Pastoral Know-How in Saharan-Sahelian Societies -- Introduction -- Inspect, Interpret and Follow Tracks: A Common and Essential Activity in the Sahara and Sahel -- Geographical Knowledge Relating to Sandy Soil -- A Shared but Unevenly Distributed Pastoral Know-How -- Footprint Identification Criteria -- Hodological Strategy and Temporalities of Tracks -- The Clues Associated with the Tracks -- Confirm, Secure or Subvert the Social Order -- Tracks as a Reflection of the Social Hierarchy -- How Can You Steal Without Signing Your Crime in the Sand? -- Monitor by Tracks -- The Effects of Sedentarization: Tracks in a World That Closes, Freezes and Fixes Itself -- Tracks in Hunting Practice -- The Increased Difficulties of ``Trace´´ Tracking in a Sedentary World -- References -- Chapter 20: Trackers´ Consensual Talk: Precise Data for Archaeology -- Introduction: Tracking and Talking -- Trackers´ Knowledge as Precise Data for Archaeology -- Tracking the Tracking in Caves Project -- Lesson 1 -- Lesson 2 -- Effects of Lessons -- Science and Memory -- Conclusion: Talk, Narrative, and Consensus as Data -- References -- Chapter 21: An Echo from a Footprint: A Step Too Far -- A New Footprint -- An Old Footprint -- References -- Chapter 22: Walking Together: Ways of Collaboration in Western-Indigenous Research on Footprints -- Introduction -- Western and Indigenous Knowledge Systems -- Differences and Similarities -- Relationality and Validity -- The Networked Space -- Horizontal Structures of Living and Learning -- Horizontal Structures of Power -- Implementing Ethics in Research -- Indigenous Guidelines -- Ethics Guide for Tracking Projects -- Project Preparation -- Project Implementation -- Evaluation and Completion of the Project -- The Common Language. , Indigenous Interpretation and Interview. , English
    Additional Edition: ISBN 3-030-60405-5
    Language: English
    Keywords: Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    edoccha_BV048918404
    Format: 1 Online-Ressource.
    ISBN: 978-3-031-30044-8
    Series Statement: Lecture notes in computer science 13990
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-3-031-30043-1
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    b3kat_BV035267747
    Format: 1 Online-Ressource (X, 403 S. , graph. Darst.)
    ISBN: 3540610553
    Series Statement: Lecture notes in computer science 1058
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Programmierung ; Programmiersprache ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Author information: Nielson, Hanne Riis 1954-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    b3kat_BV049673426
    Format: 1 Online-Ressource
    ISBN: 9783031572678
    Series Statement: Lecture notes in computer science 14577
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-3-031-57266-1
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages