Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Access
  • 1
    UID:
    almahu_9949301298302882
    Format: 1 online resource (327 pages)
    ISBN: 9789813344006
    Note: Intro -- Preface -- Committees -- Honorary Advisors -- Organization Committees -- Scientific Committees (list by surname) -- Contents -- Machine Thinking -- Machinic Phylum and Architecture -- 1 Nips and Bites -- 2 Ducks and Rabbits -- References -- Pipes of AI - Machine Learning Assisted 3D Modeling Design -- 1 Principle of CNN -- 1.1 Principle and Applications of Style Transfer -- 1.2 Project Goal -- 2 2D Image Representation of 3D Volume -- 2.1 The Effect of Style Weight in Style Transfer -- 2.2 Transformation of Image to Geometry -- 2.3 Algorithm Analysis of Geometry Generation Between Adjacent Layers -- 3 Result of Section Plans -- 3.1 Result of Perspective View -- 4 Conclusion -- References -- Developing a Digital Interactive Fabrication Process in Co-existing Environment -- 1 Introduction -- 2 Related Work -- 2.1 Fabrication Process of Maker -- 2.2 Towards Co-existing Environment -- 2.3 Automation Digital Fabrication Tools -- 2.4 Summary -- 3 Methodology -- 4 The Experiment -- 5 Conclusions -- References -- Real-Time Defect Recognition and Optimized Decision Making for Structural Timber Jointing -- 1 Introduction -- 2 Defect Recognition and Removal -- 2.1 Pre-process the Image for Segmentation -- 2.2 Preparation of the Classifier -- 2.3 Preparation of the Classifier -- 3 Decision Making for Joining Timber Segments -- 4 User Interface -- 5 Discussion and Future Development -- 6 Conclusion -- References -- On-Site BIM-Enabled Augmented Reality for Construction -- 1 Introduction -- 1.1 Motivation -- 1.2 Related Work -- 1.3 Our Solution -- 2 AR Application -- 2.1 Model Overlay Using Augmented Reality -- 2.2 Model Interaction as Query System -- 2.3 Abstraction of Drawings -- 2.4 Additional Features -- 3 Data Pipeline -- 3.1 BIM Pre-processing, Custom Parameter Creation and Population. , 3.2 Construction Document Export and Metadata Post-processing -- 4 Unity Reflect -- 5 Results -- 5.1 Case Study/User Testing -- 5.2 Future Development -- 5.3 Connections -- References -- Recycling Construction Waste Material with the Use of AR -- 1 Introduction -- 2 Aims -- 3 Method -- 3.1 Method 1 | Mass Customisation and Working to a Fixed Digital Model -- 3.2 Mass Customized Aggregation Geometry -- 3.3 Holographic Part Nesting -- 3.4 Mixed Reality Interface -- 3.5 Jointing -- 3.6 Fabrication and Fixing Methods -- 3.7 Method 2 | Working to a Flexible Digital Model -- 3.8 Results -- 4 Discussion -- 4.1 Future Development -- References -- Growing Shapes with a Generalised Model from Neural Correlates of Visual Discrimination -- 1 Introduction -- 2 Methods -- 3 Results -- 4 Conclusion -- References -- Cyborgian Approach of Eco-interaction Design Based on Machine Intelligence and Embodied Experience -- 1 Tracing Cyborgian Theory and Embodied Cognition -- 1.1 A Hybrid of Part Clock Part Swarm [10] -- 1.2 The Importance of the Presence and the Bodily Experience -- 2 How Cyborgian Approach Activates Plants? -- 2.1 How They Sense -- 2.2 How They Think -- 2.3 How They Actuate -- 3 How Cyborgian Approach Encourages Human Participation? -- 3.1 Experience Level -- 3.2 Experience Assessment -- 4 Design an Interactive Outdoor Environment -- 4.1 Challenges and Opportunities of Outdoor Interaction -- 4.2 A Cyborgian Eco-interaction Design Model -- 5 Conclusion and Outlook -- References -- Machine Seeing -- A Large-Scale Measurement and Quantitative Analysis Method of Façade Color in the Urban Street Using Deep Learning -- 1 Introduction -- 2 Literature Review -- 2.1 Urban Color Planning -- 2.2 Façade Color Measurements -- 2.3 Quantitative Analysis of Visual Quality in Urban Street -- 3 Methodology -- 3.1 Study Area and Workflow -- 3.2 Street View Data Acquisition. , 3.3 Building Façade Segmentation and Data Cleaning -- 3.4 Façade Color Calculation -- 4 Results -- 5 Discussion and Conclusion -- References -- Suggestive Site Planning with Conditional GAN and Urban GIS Data -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Acquisition and Feature Engineering -- 3.2 Machine Learning -- 3.3 Visualization -- 4 Case Study: Taking Boston as Example -- 4.1 Data Acquisition and Feature Engineering -- 4.2 Model Building and Training -- 4.3 Results and Visualization -- 5 Summary -- References -- Understanding and Analyzing the Characteristics of the Third Place in Urban Design: A Methodology for Discrete and Continuous Data in Environmental Design -- 1 Background -- 2 Methodology -- 2.1 Data and Data Structure for Manipulation -- 2.2 Pixel Structure for Continuous Data and Blending Data with Neighbors -- 2.3 Graph Structure for Discrete Data -- 3 Case Study Implementation -- 3.1 Site Selection -- 3.2 Parse Third Place Data and Visualization -- 3.3 Generate Data Structures and Inspect with Visualizations -- 3.4 Comparisons and Results -- 4 Discussion -- 5 Conclusion -- 6 Future Work -- References -- Sensing the Environmental Neighborhoods -- 1 Introduction -- 1.1 Sensing Kit Design -- 1.2 Case Study -- 1.3 Summary -- References -- A Performance-Based Urban Block Generative Design Using Deep Reinforcement Learning and Computer Vision -- 1 Introduction -- 2 Methodology -- 2.1 DRL Based Generative Design Framework -- 2.2 DDPG Agent -- 2.3 Hough Transform -- 3 Case Study -- 3.1 Observation, Action and Reward -- 3.2 Site Information -- 4 Results -- 5 Conclusions and Future Work -- References -- The Development of 'Agent-Based Parametric Semiology' as Design Research Program -- 1 Theory Background -- 2 Why We Need Agent-Based Life-Process Crowd Simulation. , 3 The Intelligence Upgrading of Agent-Based Crowd Simulation -- 3.1 Crowd Behaviour Pattern Analysis -- 3.2 Intelligent Agents -- 3.3 Semantic Virtual Environment -- 4 Quantitative Analysis, Evaluation, and Optimization -- 4.1 Methodology and Toolset -- 4.2 Scenario and Example -- 5 Discussion -- References -- Machine Learning -- Machine Learning Aided 2D-3D Architectural Form Finding at High Resolution -- 1 Introduction -- 2 Relative Work -- 3 Method -- 4 Results -- 4.1 Training Data Preparation -- 4.2 Main Network Training -- 4.3 Multiple Network Training -- 5 Conclusion -- References -- Exploration of Campus Layout Based on Generative Adversarial Network -- 1 Introduction -- 2 Related Work in the Field of Architectural Layout -- 3 Methods -- 4 Experimental Results and Analysis -- 5 Discussion -- Appendix -- References -- A Preliminary Study on the Formation of the General Layouts on the Northern Neighborhood Community Based on GauGAN Diversity Output Generator -- 1 Introduction -- 2 Research -- 2.1 AI Application in Architecture -- 2.2 Deep Learning Architectural Plan Generator Application -- 3 Methodology -- 3.1 GauGAN -- 3.2 Step Training -- 4 Machine Learning for the General Layout Shapes of the Northern Neighborhoods in China -- 4.1 Morphological Analysis -- 4.2 Data Conversion -- 4.3 Model Architecture -- 4.4 Vectorization and 3D Procedural Modeling -- 4.5 Experiment Result -- 5 Conclusion -- 5.1 GauGAN Is More in Line with Architectural Design Needs Than Pix2pix (Pix2pixHD) -- 5.2 The Use of Step Training Can Improve the Clarity of Generated Results and Allow the Later Vectorization to Be More Convenient -- References -- Artificial Intuitions of Generative Design: An Approach Based on Reinforcement Learning -- 1 Introduction -- 1.1 Contemporary Algorithmic Generative System -- 1.2 Artificial Intuitions -- 2 Background. , 2.1 Machine Learning with Generative Design -- 2.2 Reinforcement Learning -- 3 Methodology -- 3.1 Intuitive Random Walk Formation -- 3.2 RL Actions Definition -- 3.3 RL Observations Definition -- 3.4 RL Reward Definition -- 4 Discussions -- 4.1 Training Process and Outcomes -- 4.2 Further Research -- 5 Conclusions -- References -- Collection to Creation: Playfully Interpreting the Classics with Contemporary Tools -- 1 Introduction: Generations to Generative -- 2 Process: Beyond Codified Interaction -- 3 User Analysis -- 4 Media Creation -- 5 Synthetic Text Descriptions -- 6 Thoughts -- 7 Conclusion -- References -- embedGAN: A Method to Embed Images in GAN Latent Space -- 1 Introduction -- 2 Related Work -- 2.1 Regenerating Data in GAN -- 2.2 GAN Latent Walk -- 3 Method -- 3.1 Principle -- 3.2 Architecture -- 3.3 Training Details -- 4 Application -- 5 Evaluation -- 6 Conclusion -- References -- Research on Architectural Form Optimization Method Based on Environmental Performance-Driven Design -- 1 Introduction -- 2 Performance-Driven Design and Its Advantages -- 2.1 Performance-Driven Design Theory -- 2.2 Performance-Driven Design Advantages Compared with Bionic Form Design -- 3 Performance-Driven Architectural Form Optimization Method -- 3.1 Combined with Parametric Design -- 4 Form Optimization Simulation Process Establishment -- 5 Design Practice -- 5.1 Project Background -- 5.2 Design Parameters Selection and Numerical Constraint -- 5.3 Setting Simulation Parameters -- 5.4 Form Optimization Process Diagram -- 5.5 Result Analysis -- 6 Conclusion -- References -- Optimization and Prediction of Design Variables Driven by Building Energy Performance-A Case Study of Office Building in Wuhan -- 1 Introduction -- 2 Research Method -- 2.1 Research Objectives -- 2.2 Research Method. , 2.3 Multi-Island Genetic Algorithm (MIGA) and Radial Basis Functions Artificial Neural Networks (RBF-ANNs).
    Additional Edition: Print version: Yuan, Philip F. Proceedings of the 2020 DigitalFUTURES Singapore : Springer Singapore Pte. Limited,c2021 ISBN 9789813343993
    Language: English
    Subjects: Computer Science , Engineering
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Konferenzschrift ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: FULL  ((Currently Only Available on Campus))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_BV025240341
    Format: 1463 S.
    Series Statement: Technik-Wörterbuch
    Subjects: Computer Science , Engineering , Slavic Studies
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Wörterbuch ; Englisch ; Deutsch ; Französisch ; Russisch ; Datenverarbeitung ; Büromaschine ; Hochschulschrift ; Mehrsprachiges Wörterbuch ; Hochschulschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almafu_BV001979372
    Format: 1463 S.
    ISBN: 0-08-006425-6
    Note: PST: Data processing, computers, office machines*Datenverarbeitung, Rechner, Büromaschinen*Traitement des données, calculateurs, machines de bureau*Obrabotka dannych, vyčislitel'nye i kontorskie mašiny. - NST: Four-language dictionary of data processing, computers, office machines
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Datenverarbeitung ; Computer ; Enzyklopädie ; Mehrsprachiges Wörterbuch ; Wörterbuch ; Mehrsprachiges Wörterbuch ; Enzyklopädie ; Mehrsprachiges Wörterbuch ; Wörterbuch
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV005078207
    Format: 1463 S.
    Note: PST: Datenverarbeitung, Rechner, Büromaschinen*Traitement des données, calculateurs, machines de bureau*Obrabotka dannych, vyčislitel'nye i kontorskie mašiny
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    Keywords: Datenverarbeitung ; Mehrsprachiges Wörterbuch
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_BV023690294
    Format: 1463 S.
    Edition: 2., durchges. Aufl.
    Series Statement: Technik-Wörterbuch
    Former: 1. Auflage Bürger, Erich Data processing, computers, office machines
    Language: German
    Subjects: Computer Science
    RVK:
    Keywords: Datenverarbeitung ; Englisch ; Datenverarbeitung ; Französisch ; Datenverarbeitung ; Russisch ; Datenverarbeitung ; Deutsch ; Datenverarbeitung ; Mehrsprachiges Wörterbuch ; Wörterbuch ; Mehrsprachiges Wörterbuch ; Wörterbuch
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Apress | Berkeley, CA :Apress :
    UID:
    almahu_9949292608702882
    Format: 1 online resource (376 p.)
    Edition: 1st ed. 2014.
    ISBN: 1-4302-6383-0
    Series Statement: Expert's voice in information security The InfoSec handbook
    Content: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face.
    Note: Bibliographic Level Mode of Issuance: Monograph , Intro -- Contents at a Glance -- Contents -- About the Authors -- Acknowledgments -- Introduction -- Part I: Introduction -- Chapter 1: Introduction to Security -- What is Security? -- Why is Security Important? -- What if You Do Not Care About Security? -- The Evolution of the Computer and Information Security -- Information Security Today -- Applicable Standards and Certifications -- The Role of a Security Program -- Chapter 2: History of Computer Security -- Introduction -- Communication -- World Wars and Their Influence on the Field of Security -- Cypher Machine: Enigma -- Bletchley Park -- Code Breakers -- Some Historical Figures of Importance: Hackers and Phreakers -- Kevin Mitnick -- Chapter Summary -- Part II: Key Principles and Practices -- Chapter 3: Key Concepts and Principles -- Introduction -- Security Threats -- External and Internal Threats -- Information Security Frameworks and Information Security Architecture -- Information Security Management Systems Framework Provided by ISO/IEC 27001:2013 -- NIST Special Publication 800-39 complemented by 800-53 -- SABSA® -- Pillars of Security -- People -- Organization of Information Security -- The Need for Independence -- Specific Roles and Responsibilities -- Audit Committee or Information Security Committee at the Board Level -- Information Security Sponsor or Champion -- Chief Information Security Officer or Information Security Officer -- Information Security Forum -- Information Security Specialists -- Project Managers -- Data Owners -- Data Custodians -- Users of the data -- Authority for Information Security -- Policies, Procedures, and Processes -- Technology -- Information Security Concepts -- CIA Triad -- Confidentiality -- Integrity -- Availability -- Parkerian Hexad -- Implementation of Information Security -- Risk Assessment -- Planning and Architecture -- Gap Analysis. , Integration and Deployment -- Operations -- Monitoring -- Legal Compliance and Audit -- Crisis Management -- Principles of Information Security -- Chapter Summary -- Chapter 4: Access Controls -- Introduction -- Confidentiality and Data Integrity -- Who Can Access the Data? -- What is an Access Control? -- Authentication and Authorization -- Authentication and Access Control Layers -- Administrative Access Controls (Layer) -- Access Control Policy -- Personnel related - jobs, responsibilities, and authorities -- Segregation of duties -- Supporting policies and procedure -- Control Over Information Access to Trade Restricted Persons -- Technical (Logical) Controls -- Passwords -- Smartcards -- Encryption -- Network Access -- System Access -- Physical Access Controls -- Network Segregation -- Perimeter Security -- Security Guards -- Badge Systems -- Biometric Access Controls -- Access Control Strategies -- Discretionary Access Control (DAC) -- Mandatory Access Control (MAC) -- Role-Based Access Control (RBAC) -- Attribute Based Access Control -- Implementing Access Controls -- Access Control Lists (ACLs) -- File System ACLs -- Network ACLs -- AAA Framework -- RADIUS and TACAS+ -- LDAP and Active Directory -- IDAM -- Chapter Summary -- Chapter 5: Information Systems Management -- Introduction -- Risk -- Incident -- Disaster -- Disaster Recovery -- Business Continuity -- Risk Management -- Identification of Risk -- Risk Analysis -- Risk Responses -- Execution of the Risk Treatment Plans -- The Importance of Conducting a Periodic Risk Assessment -- Incident Response -- Incident Response Policy, Plan, and Processes -- Incident Response Policy -- Purpose and Scope of the Policy -- Definition of Information Security Incidents and Related Terms 2 -- Organizational Structure, Roles, Responsibilities, and Authorities -- Ratings of Incidents -- Measurements. , Incident Response Plan -- Purpose and Scope -- Strategies, Goals, and Approach to Incident Response -- Internal and External Communication Plan -- Plan for the Incident Response Capability 2 -- Measurement of Incident Response Capability and its Effectiveness -- Integration with the Other Plans of the Organization -- Incident Response Processes -- Incident Response Teams -- Incident Response Team structuring based on distribution of the Responsibilities -- Centralized Incident Response Teams 2 -- Distributed Incident Response Teams 2 -- Hybrid Incident Response Teams -- Incident Response Team Structuring Based on who Constitutes the Teams -- Fully Employee Constituted Incident Response Teams -- Fully Outsourced Incident Response Teams -- Hybrid Teams: Partially Constituted by Employees and Partially Constituted by Outsourced Contractors -- Ensuring Effectiveness of Incident Response -- Preparation 2 -- Incident Detection 2 -- Precursors and Indicators of Incidents 2 -- Sources of Precursors and Indicators -- Analysis of the Incidents: 2 -- Incident Im pact Analysis and Prioritization of the Actions 2 -- Incident Documentation and Incident Notification 2 -- Incident Containment, Eradication, and Recovery 2 -- Containment Strategy 2 -- Evidence Gathering and Handling 2 -- Eradication and Recovery 2 -- Post Incident Analysis and Activities 2 -- Analysis of Learnings -- Use of Incident Data 2 -- Disaster Recovery and Business Continuity -- How to Approach Business Continuity Plan -- Assign Clear Roles and Responsibilities -- Sponsor -- Project Manager -- Business Continuity Planning Team -- Life Cycle of Business Continuity Planning -- Scoping -- Plan for Formulation of Business Continuity Plan -- Business Continuity Plan Kick-Off Meeting -- Business Impact Analysis (BIA) -- Business Continuity Plan Preparation. , Business Continuity Plan Validation & Training -- Up-to-date Maintenance of the BCP -- Chapter Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness of Processing -- Correctness of Processing -- Completeness of the Updates -- Correctness of the Updates -- Preservation of the Integrity of the Data in Storage -- Preservation of the Integrity of the Data while in Transmission -- Importance of an Effective Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web Browsers, Web Servers, and Web Applications -- Vulnerabilities in Web Browsers -- Inappropriate Configuration -- Unnecessary or Untrusted Add-ons -- Malware or Executables run on the Web Browser -- No Patching up or Carrying out the Security Updates -- How to Overcome the Vulnerabilities of Web Browsers -- Vulnerabilities of Web Servers -- Default Users and Default Permissions are not changed -- Sample files and scripts are not removed -- Default Configuration is Not Changed -- File and Directory Permissions are not Set Properly -- Security Loop-Holes or Defects in the Web Server Software or Underlying Operating System -- How to Overcome the Web Server Vulnerabilities -- Web Applications -- SQL Injection Attacks -- Command Injection Attacks -- Buffer Overflow Attacks -- Cro ss-Site Scripting -- Cookie Poisoning -- Session Hijacking Attacks -- How to Overcome Web Application Vulnerabilities -- Secure Socket Layer (SSL) Security and Digital Certificate -- Chapter Summary -- Chapter 7: Malicious Software and Anti-Virus Software -- Introduction -- Malware Software -- Introduction to Malware -- Covert channels -- Types of Malware in Detail -- Spyware -- Adware -- Trojans -- Viruses -- Worms -- Backdoors. , Botnets -- A Closer Look at Spyware -- Trojans and Backdoors -- Rootkits -- Viruses and Worms -- Botnets -- Brief History of Viruses, Worms, and Trojans -- The Current Situation -- Anti-Virus Software -- Need for Anti-Virus Software -- Top 5 Commercially Available Anti-Virus Software -- Symantec Norton Anti-Virus Software -- McAfee Anti- Virus -- Kaspersky Anti- Virus -- Bitdefender Anti- Virus -- AVG Anti-Virus Software -- A Few Words of Caution -- Chapter Summary -- Chapter 8: Cryptography -- Introduction -- Cryptographic Algorithms -- Symmetric Key Cryptography -- Key Distribution -- Asymmetric Key Cryptography -- Public Key Cryptography -- RSA Algorithm -- Advantages of Public Key Cryptography -- Applications of PKC -- Public Key Infrastructure (PKI) -- Certificate Authority (CA) -- Digital Certificate -- Hash Function Cryptography -- Popular Hashes -- Digital Signatures -- Summary of Cryptography Standard Algorithms -- Disk / Drive Encryption -- Attacks on Cryptography -- Chapter Summary -- Part IV: Network Security -- Chapter 9: Understanding Networks and Network Security -- Introduction -- Networking Fundamentals -- Computer Communication -- Network and its Components -- Network Protocols -- OSI (Open Systems Interconnection) Reference Model -- TCP/IP Model -- Network Vulnerabilities and Threats -- Vulnerabilities -- Security Policy Weaknesses -- Technology Weaknesses -- Configuration Weaknesses -- Threats -- Attacks -- Reconnaissance -- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) -- Other Attacks on Networks -- How to counter the Network Attacks -- Chapter Summary -- Chapter 10: Firewalls -- Introduction -- How Do You Protect a Network? -- Firewall -- Basic Functions of Firewall -- Packet Filtering -- How a packet filtering firewall works -- TCP Layer -- An Example of Packet Filtering Rules. , Advantages and Disadvantages of Packet filtering. , English
    Additional Edition: ISBN 1-4302-6382-2
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Berkeley, CA :Apress L. P.,
    UID:
    almahu_9949301352202882
    Format: 1 online resource (376 pages)
    ISBN: 9781430263838
    Note: Intro -- Contents at a Glance -- Contents -- About the Authors -- Acknowledgments -- Introduction -- Part I: Introduction -- Chapter 1: Introduction to Security -- What is Security? -- Why is Security Important? -- What if You Do Not Care About Security? -- The Evolution of the Computer and Information Security -- Information Security Today -- Applicable Standards and Certifications -- The Role of a Security Program -- Chapter 2: History of Computer Security -- Introduction -- Communication -- World Wars and Their Influence on the Field of Security -- Cypher Machine: Enigma -- Bletchley Park -- Code Breakers -- Some Historical Figures of Importance: Hackers and Phreakers -- Kevin Mitnick -- Chapter Summary -- Part II: Key Principles and Practices -- Chapter 3: Key Concepts and Principles -- Introduction -- Security Threats -- External and Internal Threats -- Information Security Frameworks and Information Security Architecture -- Information Security Management Systems Framework Provided by ISO/IEC 27001:2013 -- NIST Special Publication 800-39 complemented by 800-53 -- SABSA® -- Pillars of Security -- People -- Organization of Information Security -- The Need for Independence -- Specific Roles and Responsibilities -- Audit Committee or Information Security Committee at the Board Level -- Information Security Sponsor or Champion -- Chief Information Security Officer or Information Security Officer -- Information Security Forum -- Information Security Specialists -- Project Managers -- Data Owners -- Data Custodians -- Users of the data -- Authority for Information Security -- Policies, Procedures, and Processes -- Technology -- Information Security Concepts -- CIA Triad -- Confidentiality -- Integrity -- Availability -- Parkerian Hexad -- Implementation of Information Security -- Risk Assessment -- Planning and Architecture -- Gap Analysis. , Integration and Deployment -- Operations -- Monitoring -- Legal Compliance and Audit -- Crisis Management -- Principles of Information Security -- Chapter Summary -- Chapter 4: Access Controls -- Introduction -- Confidentiality and Data Integrity -- Who Can Access the Data? -- What is an Access Control? -- Authentication and Authorization -- Authentication and Access Control Layers -- Administrative Access Controls (Layer) -- Access Control Policy -- Personnel related - jobs, responsibilities, and authorities -- Segregation of duties -- Supporting policies and procedure -- Control Over Information Access to Trade Restricted Persons -- Technical (Logical) Controls -- Passwords -- Smartcards -- Encryption -- Network Access -- System Access -- Physical Access Controls -- Network Segregation -- Perimeter Security -- Security Guards -- Badge Systems -- Biometric Access Controls -- Access Control Strategies -- Discretionary Access Control (DAC) -- Mandatory Access Control (MAC) -- Role-Based Access Control (RBAC) -- Attribute Based Access Control -- Implementing Access Controls -- Access Control Lists (ACLs) -- File System ACLs -- Network ACLs -- AAA Framework -- RADIUS and TACAS+ -- LDAP and Active Directory -- IDAM -- Chapter Summary -- Chapter 5: Information Systems Management -- Introduction -- Risk -- Incident -- Disaster -- Disaster Recovery -- Business Continuity -- Risk Management -- Identification of Risk -- Risk Analysis -- Risk Responses -- Execution of the Risk Treatment Plans -- The Importance of Conducting a Periodic Risk Assessment -- Incident Response -- Incident Response Policy, Plan, and Processes -- Incident Response Policy -- Purpose and Scope of the Policy -- Definition of Information Security Incidents and Related Terms 2 -- Organizational Structure, Roles, Responsibilities, and Authorities -- Ratings of Incidents -- Measurements. , Incident Response Plan -- Purpose and Scope -- Strategies, Goals, and Approach to Incident Response -- Internal and External Communication Plan -- Plan for the Incident Response Capability 2 -- Measurement of Incident Response Capability and its Effectiveness -- Integration with the Other Plans of the Organization -- Incident Response Processes -- Incident Response Teams -- Incident Response Team structuring based on distribution of the Responsibilities -- Centralized Incident Response Teams 2 -- Distributed Incident Response Teams 2 -- Hybrid Incident Response Teams -- Incident Response Team Structuring Based on who Constitutes the Teams -- Fully Employee Constituted Incident Response Teams -- Fully Outsourced Incident Response Teams -- Hybrid Teams: Partially Constituted by Employees and Partially Constituted by Outsourced Contractors -- Ensuring Effectiveness of Incident Response -- Preparation 2 -- Incident Detection 2 -- Precursors and Indicators of Incidents 2 -- Sources of Precursors and Indicators -- Analysis of the Incidents: 2 -- Incident Im pact Analysis and Prioritization of the Actions 2 -- Incident Documentation and Incident Notification 2 -- Incident Containment, Eradication, and Recovery 2 -- Containment Strategy 2 -- Evidence Gathering and Handling 2 -- Eradication and Recovery 2 -- Post Incident Analysis and Activities 2 -- Analysis of Learnings -- Use of Incident Data 2 -- Disaster Recovery and Business Continuity -- How to Approach Business Continuity Plan -- Assign Clear Roles and Responsibilities -- Sponsor -- Project Manager -- Business Continuity Planning Team -- Life Cycle of Business Continuity Planning -- Scoping -- Plan for Formulation of Business Continuity Plan -- Business Continuity Plan Kick-Off Meeting -- Business Impact Analysis (BIA) -- Business Continuity Plan Preparation -- Business Continuity Plan Validation &. , Training -- Up-to-date Maintenance of the BCP -- Chapter Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness of Processing -- Correctness of Processing -- Completeness of the Updates -- Correctness of the Updates -- Preservation of the Integrity of the Data in Storage -- Preservation of the Integrity of the Data while in Transmission -- Importance of an Effective Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web Browsers, Web Servers, and Web Applications -- Vulnerabilities in Web Browsers -- Inappropriate Configuration -- Unnecessary or Untrusted Add-ons -- Malware or Executables run on the Web Browser -- No Patching up or Carrying out the Security Updates -- How to Overcome the Vulnerabilities of Web Browsers -- Vulnerabilities of Web Servers -- Default Users and Default Permissions are not changed -- Sample files and scripts are not removed -- Default Configuration is Not Changed -- File and Directory Permissions are not Set Properly -- Security Loop-Holes or Defects in the Web Server Software or Underlying Operating System -- How to Overcome the Web Server Vulnerabilities -- Web Applications -- SQL Injection Attacks -- Command Injection Attacks -- Buffer Overflow Attacks -- Cro ss-Site Scripting -- Cookie Poisoning -- Session Hijacking Attacks -- How to Overcome Web Application Vulnerabilities -- Secure Socket Layer (SSL) Security and Digital Certificate -- Chapter Summary -- Chapter 7: Malicious Software and Anti-Virus Software -- Introduction -- Malware Software -- Introduction to Malware -- Covert channels -- Types of Malware in Detail -- Spyware -- Adware -- Trojans -- Viruses -- Worms -- Backdoors -- Botnets -- A Closer Look at Spyware. , Trojans and Backdoors -- Rootkits -- Viruses and Worms -- Botnets -- Brief History of Viruses, Worms, and Trojans -- The Current Situation -- Anti-Virus Software -- Need for Anti-Virus Software -- Top 5 Commercially Available Anti-Virus Software -- Symantec Norton Anti-Virus Software -- McAfee Anti- Virus -- Kaspersky Anti- Virus -- Bitdefender Anti- Virus -- AVG Anti-Virus Software -- A Few Words of Caution -- Chapter Summary -- Chapter 8: Cryptography -- Introduction -- Cryptographic Algorithms -- Symmetric Key Cryptography -- Key Distribution -- Asymmetric Key Cryptography -- Public Key Cryptography -- RSA Algorithm -- Advantages of Public Key Cryptography -- Applications of PKC -- Public Key Infrastructure (PKI) -- Certificate Authority (CA) -- Digital Certificate -- Hash Function Cryptography -- Popular Hashes -- Digital Signatures -- Summary of Cryptography Standard Algorithms -- Disk / Drive Encryption -- Attacks on Cryptography -- Chapter Summary -- Part IV: Network Security -- Chapter 9: Understanding Networks and Network Security -- Introduction -- Networking Fundamentals -- Computer Communication -- Network and its Components -- Network Protocols -- OSI (Open Systems Interconnection) Reference Model -- TCP/IP Model -- Network Vulnerabilities and Threats -- Vulnerabilities -- Security Policy Weaknesses -- Technology Weaknesses -- Configuration Weaknesses -- Threats -- Attacks -- Reconnaissance -- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) -- Other Attacks on Networks -- How to counter the Network Attacks -- Chapter Summary -- Chapter 10: Firewalls -- Introduction -- How Do You Protect a Network? -- Firewall -- Basic Functions of Firewall -- Packet Filtering -- How a packet filtering firewall works -- TCP Layer -- An Example of Packet Filtering Rules -- Advantages and Disadvantages of Packet filtering. , Stateful Packet Filtering.
    Additional Edition: Print version: Nayak, Umesha The InfoSec Handbook Berkeley, CA : Apress L. P.,c2014 ISBN 9781430263821
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg
    UID:
    gbv_1647761972
    Format: Online-Ressource (digital)
    ISBN: 9783540744276
    Series Statement: SpringerLink
    Content: This book is a companion text to Orthopedic Rehabilitation, Assessment, and Enablement by the same author, but can be used independently. Section 1 serves to illustrate through real-life examples the rehabilitation ideas and principles taught in the companion text, ranging from conditions seen daily by the orthopedic surgeon or primary care physician like knee and hip osteoarthritis or plantar fasciitis, through more challenging conditions like hamstring injury rehabilitation or heterotrophic ossification, to recent paradigm shifts in the management of osteoporosis and new technologies like vertebral fracture assessment using state-of-the-art DXA machines, hypergravity stimulation therapy, and many more. In Section 2, the author introduces the reader to the vast number of applications of computers in orthopedic surgery, with special emphasis on the emerging importance of virtual reality in all aspects of orthopedics, ranging from pre-operative planning, pre-operative surgical practice on virtual patients, and virtual wayfinding and navigation, through intra-operative virtual bone structure modeling to enhance accuracy, to, most importantly, post-operative or non-operative rehabilitation of orthopedic conditions using these new computer techniques. The book ends by stressing the importance of telerehabilitation, an increasingly important tool for ensuring that even patients living in remote rural areas can have the chance to participate in rehabilitation guided by a therapist through the use of a virtual environment and teleconferencing.
    Note: Description based upon print version of record , CONTENTS; Section I; Case 1 New Dual-energy X-ray Absorptiometry Machines(iDXA) and Vertebral Fracture Assessment (VFA); Case 2 Hyper-gravity Stimulation Therapy; Case 3 Lady Having Difficulty in Controllingthe Computer Mouse; Case 4 Whiplash-associated Neck Disabilities; Case 5 Sizable Cartilage Defect in a Professional Footballer; Case 6 Functional Knee Complaintsin a Child with Cerebral Palsy; Case 7 Hamstrings Injuries in a Professional Sprinter; Case 8 Was it Simply Tachycardia or Something More Sinister?; Case 9 A Lady with Intractable Heel Pain , Case 10 Hip Swelling after Combined TBI and SCICase 11 Consultation for a Third Opinion on Bone Health; Case 12 Was It Really Another Case of "Tennis Elbow"?; Case 13 A Patient Requesting an "Oxford Uni" for his knee OA; Case 14 Bisphosphonates and Peri-prosthetic Osteolysis; Case 15 A Young Engineer with Disabling Sciatic Pain; Case 16 The "Wonder Drug" Glucosamine; Case 17 Hyaluronan for Knee OA, Facts Vs. Myths; Case 18 High Heels Woes; Case 19 Silent Bone Loss and Vitamin D Insufficiency; Case 20 A Professor Suffering from OA Knee Pain; Case 21 New Physical Sign in Carpal Tunnel Syndrome , Case 22 KinesiophobiaCase 23 Breakthrough Fracture While on Bisphosphonates; Case 24 Can Back Pain Be Predicted?; Case 25 Enthusiasm for "Non-fusion Technology"for Discogenic Back Pain; Case 26 Extra Busy Banker Troubled by Subacute Back Pain,Yet No Time for Physiotherapy; Case 27 Metal-on-Metal Hip Surface Replacement; Case 28 A Young Lady with AVN after SARS; Case 29 An Athlete Going for Anterior Cruciate LigamentReconstruction with Little Time for Rehabilitation; Case 30 The Office Lady with Neck, Shoulder, Arm, and Back Pain; Case 31 Bone Health and Space Travel; Case 32 Crouch Gait , Case 33 Non-healing Diabetes Mellitus Heel UlcerCase 34 Cervical Disc Replacement; Case 35 Intractable Lateral Epicondylitis; Case 36 Chronic LBP in a Laborer Whose JobRequires Repeated Lifting; Case 37 Stiffness after Flexor Tendon Repair; Case 38 Postpartum Sacroiliac Joint Pain; Case 39 Use of Smart Materials in Orthopedics; Section II; General Introduction; Uses of the Computer in Orthopedics; Emerging Importance of Data Storage and Retrieval; Why Develop Virtual Reality?; Summarizing the Four Main Advantages of Virtual Reality; Key Components of a Virtual Reality Platform; Evolution , Forms of Virtual RealityModifications to Suit Training in Surgery and Rehabilitation:Concept of Mixed or Augmented Reality; Uses of Virtual Reality in Orthopedic Surgery and Rehabilitation; Advances in Hardware; Advances in Software; The Process of Pipeline Synchronization; Advances in Input-output Devices; Improving Visual Effects and Depth Perception; Quick Scanning of 3D Objects SubsequentlyUsed in the Virtual World; Virtual 3D Sound Effects Vs. Stereo Sound Effects; Importance of the Use of Haptic and Force Feedbacksin Orthopedic Rehabilitation , Other Modalities Besides Vision, Hearing, and Force Feedbacks
    Additional Edition: ISBN 9783540744269
    Additional Edition: Buchausg. u.d.T. Ip, David Casebook of orthopedic rehabilitation Berlin : Springer, 2008 ISBN 9783540744269
    Additional Edition: ISBN 3540744266
    Language: English
    Keywords: Orthopädie ; Rehabilitation ; Fallstudiensammlung
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
  • 10
    Book
    Book
    Berlin : Verlag Technik 〈Berlin, Ost〉
    UID:
    kobvindex_ZLB14145946
    Format: 1463 Seiten
    Series Statement: Technik-Wörterbuch
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages