Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Sprache
Region
Erscheinungszeitraum
  • 1
    Online-Ressource
    Online-Ressource
    New York, NY :Association for Computing Machinery, ; 1.1979 -
    UID:
    almahu_BV013389551
    Umfang: Online-Ressource.
    ISSN: 1558-4593
    Anmerkung: Gesehen am 12.11.19
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe Association for Computing Machinery ACM transactions on programming languages and systems New York, NY : Assoc., 1979- ISSN 0164-0925
    Früher: Darin aufgeg. Association for Computing Machinery ACM letters on programming languages and systems
    Sprache: Englisch
    Schlagwort(e): Programmiersprache ; Zeitschrift ; Online-Ressource ; Zeitschrift ; Zeitschrift ; Zeitschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9949602151202882
    Umfang: 1 online resource (123 pages)
    Ausgabe: 1st ed.
    ISBN: 9783319749501
    Serie: Simula SpringerBriefs on Computing Series ; v.4
    Anmerkung: Intro -- Foreword -- Preface -- Contents -- 1 Introduction -- 1.1 A New Situation -- 1.2 What Are We Afraid Of? -- 1.3 Huawei and ZTE -- 1.4 Trust in Vendors -- 1.5 Points of Attack -- 1.6 Trust in Vendors Is Different from Computer Security -- 1.7 Why the Problem Is Important -- 1.8 Advice for Readers -- References -- 2 Trust -- 2.1 Prisoner's Dilemma -- 2.2 Trust and Game Theory -- 2.3 Trust and Freedom of Choice -- 2.4 Trust, Consequence, and Situation -- 2.5 Trust and Security -- 2.6 Trusted Computing Base -- Trust Between Components -- 2.7 Discussion -- References -- 3 What Is an ICT System? -- 3.1 Transistors and Integrated Circuits -- 3.2 Memory and Communication -- 3.3 Processors and Instruction Sets -- 3.4 Firmware -- 3.5 Operating Systems, Device Drivers, Hardware Adaptation Layers, and Hypervisors -- 3.6 Bytecode Interpreters -- 3.7 The Application on Top -- 3.8 Infrastructures and Distributed Systems -- 3.9 Discussion -- References -- 4 Development of ICT Systems -- 4.1 Software Development -- 4.2 Hardware Development -- 4.3 Security Updates and Maintenance -- 4.4 Discussion -- References -- 5 Theoretical Foundation -- 5.1 Gödel and the Liar's Paradox -- 5.2 Turing and the Halting Problem -- 5.3 Decidability of Malicious Behaviour -- 5.4 Is There Still Hope? -- 5.5 Where Does This Lead Us? -- References -- 6 Reverse Engineering of Code -- 6.1 Application of Reverse Engineering in ICT -- 6.2 Static Code Analysis -- 6.3 Disassemblers -- 6.4 Decompilers -- 6.5 Debuggers -- 6.6 Anti-reversing -- 6.7 Hardware -- 6.8 Discussion -- References -- 7 Static Detection of Malware -- 7.1 Malware Classes -- 7.2 Signatures and Static Code Analysis -- 7.3 Encrypted and Oligomorphic Malware -- 7.4 Obfuscation Techniques -- 7.5 Polymorphic and Metamorphic Malware -- 7.6 Heuristic Approaches -- 7.7 Malicious Hardware. , 7.8 Specification-Based Techniques -- 7.9 Discussion -- References -- 8 Dynamic Detection Methods -- 8.1 Dynamic Properties -- 8.2 Unrestricted Execution -- 8.3 Emulator-Based Analysis -- 8.4 Virtual Machines -- 8.5 Evasion Techniques -- 8.6 Analysis -- 8.7 Hardware -- 8.8 Discussion -- References -- 9 Formal Methods -- 9.1 Overview -- 9.2 Specification -- 9.3 Programming Languages -- 9.4 Hybrid Programming and Specification Languages -- 9.5 Semantic Translation -- 9.6 Logics -- 9.7 Theorem Proving and Model Checking -- 9.8 Proof-Carrying Code -- 9.9 Conclusion -- References -- 10 Software Quality and Quality Management -- 10.1 What is Software Quality Management? -- 10.2 Software Development Process -- 10.3 Software Quality Models -- 10.4 Software Quality Management -- 10.5 Software Quality Metrics -- 10.6 Standards -- 10.7 Common Criteria (ISO/IEC 15408) -- 10.8 Software Testing -- 10.9 Verification Through Formal Methods -- 10.10 Code Review -- 10.11 Discussion -- References -- 11 Containment of Untrusted Modules -- 11.1 Overview -- 11.2 Partial Failures and Fault Models -- 11.3 Erlang: A Programming Language Supporting Containment -- 11.4 Microservices: An Architecture Model Supporting Containment -- 11.5 Hardware Containment -- 11.6 Discussion -- References -- 12 Summary and Way Forward -- 12.1 Summary of Findings -- 12.2 The Way Forward -- 12.2.1 Encryption -- 12.2.2 Formal Methods -- 12.2.3 Heterogeneity and Containment -- 12.3 Concluding Remarks.
    Weitere Ausg.: Print version: Lysne, Olav The Huawei and Snowden Questions Cham : Springer International Publishing AG,c2018 ISBN 9783319749495
    Sprache: Englisch
    Fachgebiete: Wirtschaftswissenschaften
    RVK:
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: OAPEN
    URL: OAPEN
    URL: OAPEN  (Creative Commons License)
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    UID:
    almahu_9949602274902882
    Umfang: 1 online resource (377 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811365287
    Anmerkung: Intro -- Preface -- Contents -- 1 Introduction to Computational Thinking Education -- 1.1 Introduction -- 1.2 Conceptual Framework and Chapters in This Book -- 1.2.1 Sub-theme 1: Computational Thinking and Tool Development -- 1.2.2 Sub-theme 2: Student Competency and Assessment -- 1.2.3 Sub-theme 3: Computational Thinking and Programming Education in K-12 -- 1.2.4 Sub-theme 4: Computational Thinking in K-12 STEM Education and Non-formal Learning -- 1.2.5 Sub-theme 5: Teacher and Mentor Development in K-12 Education -- 1.2.6 Sub-theme 6: Computational Thinking in Educational Policy and Implementation -- References -- Computational Thinking and Tool Development -- 2 Computational Thinking-More Than a Variant of Scientific Inquiry! -- 2.1 Introduction -- 2.1.1 Origins of the Current Debate -- 2.1.2 Computational Thinking for K-12 -- 2.1.3 Model Progression: The Use-Modify-Create Scheme -- 2.1.4 The CT Terminology -- 2.2 Basic Concepts and Building Blocks -- 2.2.1 "Computational Models" and "Models of Computation" -- 2.2.2 The Notion of "Abstraction" -- 2.2.3 Languages, Representations, and Microworlds -- 2.2.4 CT from the Perspective of Inquiry Learning in Science -- 2.2.5 Interim Summary -- 2.3 Specific Approaches and Examples -- 2.3.1 From Reactive Rule-Based Programming to Block Structures -- 2.3.2 "Computational Metacognition" -- 2.4 Conclusion -- References -- 3 MIT App Inventor: Objectives, Design, and Development -- 3.1 Introduction -- 3.2 MIT App Inventor Overview -- 3.3 MIT App Inventor Design Goals -- 3.3.1 Component Abstraction for Platform Behavior -- 3.3.2 Blocks as Logic -- 3.3.3 Mental Modeling -- 3.3.4 Fast Iteration and Design Using the Companion -- 3.4 The History of MIT App Inventor -- 3.4.1 Inception at Google -- 3.4.2 Educational Expansion at MIT -- 3.5 MIT App Inventor in Education -- 3.5.1 Massive Open Online Courses. , 3.5.2 MIT Master Trainers Program -- 3.5.3 Extensions -- 3.5.4 Research Projects -- 3.6 Empowerment Through Programming -- 3.6.1 From Theoretical to Practical -- 3.6.2 Computational Thinking -- 3.6.3 Computational Action -- 3.6.4 Supporting a Community Around Computation and App Creation -- 3.7 Discussion -- 3.7.1 Common Misconceptions -- 3.7.2 Limitations -- 3.7.3 Benefits of Visual Programming for Mobile -- 3.8 Conclusions -- 3.8.1 Future Vision -- References -- Student Competency and Assessment -- 4 Measuring Secondary School Students' Competence in Computational Thinking in ICILS 2018-Challenges, Concepts, and Potential Implications for School Systems Around the World -- 4.1 Introduction: The Relevance of Researching Teaching and Learning Computational Thinking in Schools -- 4.2 Researching Students' Achievement in Computational Thinking in the Context of ICILS 2018 -- 4.2.1 ICILS 2018-Assessing Students' Readiness for the Digital World in the Scope of an International Comparative Study -- 4.2.2 Computational Thinking as Part of ICILS 2018 -- 4.3 Relevance and Potential Outcomes for Educational Systems Around the World -- References -- 5 Computational Thinking Processes and Their Congruence with Problem-Solving and Information Processing -- 5.1 Introduction -- 5.2 Current State of Research -- 5.2.1 Computational Thinking and Problem-Solving -- 5.2.2 Computational Thinking and Information Processing -- 5.2.3 Computational Thinking Processes -- 5.2.4 In-School Acquisition of Competences in the Field of Computational Thinking -- 5.3 Research Concept -- 5.3.1 Study and Data Basis -- 5.3.2 Methodology and Expected Outcomes -- 5.4 Summary and Outlook -- References -- 6 Combining Assessment Tools for a Comprehensive Evaluation of Computational Thinking Interventions -- 6.1 Introduction -- 6.2 Computational Thinking Assessment Tools. , 6.3 Convergent Validity Studies -- 6.4 A Comprehensive Evaluation of Computational Thinking Interventions -- 6.5 Conclusions and Further Research -- References -- 7 Introducing and Assessing Computational Thinking in the Secondary Science Classroom -- 7.1 Introduction -- 7.2 Theoretical Orientation -- 7.3 Method -- 7.3.1 Study Design -- 7.3.2 Participants -- 7.3.3 CT-STEM Units -- 7.3.4 Data Collection -- 7.3.5 Analytic Approach -- 7.4 Findings -- 7.4.1 Learning Objective 1: Explore a Model by Changing Parameters -- 7.4.2 Learning Objective 2: Identify Simplifications Made by a Model -- 7.5 Discussion -- References -- 8 Components and Methods of Evaluating Computational Thinking for Fostering Creative Problem-Solvers in Senior Primary School Education -- 8.1 Introduction -- 8.2 Background -- 8.2.1 Computational Thinking -- 8.2.2 The Adopted Framework for Computational Thinking Evaluation -- 8.3 Methodology -- 8.4 Results and Discussion Based on Literature Review -- 8.4.1 CT Concepts -- 8.4.2 CT Practices -- 8.4.3 CT Perspectives -- 8.5 Conclusion -- References -- Computational Thinking and Programming Education in K-12 -- 9 Learning Composite and Prime Numbers Through Developing an App: An Example of Computational Thinking Development Through Primary Mathematics Learning -- 9.1 Introduction -- 9.2 Background -- 9.2.1 CT Framework -- 9.2.2 Block-Based Programming Environments -- 9.2.3 Mathematics Learning and CT Development -- 9.2.4 Learning Composite and Prime Numbers in Primary School Mathematics -- 9.3 Developing an App as Pedagogy for Supporting the Conceptual Understanding of Composite and Prime Numbers -- 9.3.1 Inquiry Activities About Composite and Prime Numbers -- 9.3.2 Developing an App as Pedagogy -- 9.3.3 Problem Decomposition and Algorithmic Thinking -- 9.3.4 Reusing Code from a Simple App to Build an App to Find Factors. , 9.3.5 Testing the App and Connecting the Tasks with the Digital World -- 9.3.6 Using '1' and '0' to Trigger In-depth Discussion of Composite and Prime Numbers -- 9.3.7 Adding a Conditional Statement to the App to Handle the Case of Inputting 0 -- 9.4 Computational Thinking Development -- 9.4.1 CT Concepts Development -- 9.4.2 CT Practices Development -- 9.4.3 CT Perspectives Development -- 9.5 Conclusion -- References -- 10 Teaching Computational Thinking Using Mathematics Gamification in Computer Science Game Tournaments -- 10.1 Introduction -- 10.2 Algebra Gamification -- 10.3 Mathematics Gamification of Algebra Maze -- 10.4 Mathematics Gamification of Algebra Game -- 10.5 Case Study of Computer Science Challenge Game Tournament -- 10.6 Further Discussions -- 10.7 Conclusions -- References -- 11 Mathematics Learning: Perceptions Toward the Design of a Website Based on a Fun Computational Thinking-Based Knowledge Management Framework -- 11.1 Introduction -- 11.1.1 Problem -- 11.1.2 Objectives -- 11.2 Literature Review -- 11.2.1 Computational Thinking (CT) -- 11.2.2 Game-Based Learning and Gamification -- 11.2.3 Knowledge Management -- 11.3 Methodology -- 11.3.1 Website Component Design Based on Computational Thinking (CT) -- 11.4 Pilot Test: Preliminary Design and Analysis -- 11.5 Alpha Testing: Design and Development -- 11.5.1 Alpha User Testing -- 11.6 Beta Testing -- 11.7 Comparison Between Alpha-Beta User Testings -- 11.8 Significance -- 11.9 Conclusion -- References -- Computational Thinking in K-12 STEM Education and Non-formal Learning -- 12 Defining and Assessing Students' Computational Thinking in a Learning by Modeling Environment -- 12.1 Introduction -- 12.2 Related Work -- 12.3 The STEM + CT Framework -- 12.3.1 The STEM + CT Framework -- 12.3.2 The Learning Environment -- 12.3.3 The Assessment Framework -- 12.4 Results and Discussion. , 12.4.1 Overall Learning Gains -- 12.4.2 The Correlations and Synergies in STEM and CT Learning -- 12.4.3 The Use of STEM + CT Practices -- 12.5 Conclusions -- References -- 13 Roles, Collaboration, and the Development of Computational Thinking in a Robotics Learning Environment -- 13.1 Introduction -- 13.1.1 Computational Thinking -- 13.1.2 Educational Robotics and Computational Thinking -- 13.1.3 Collaborative Learning with Robotics: Emergent Roles -- 13.1.4 Research Questions -- 13.2 Methods -- 13.2.1 Phase I-Behavior Analysis: Roles and Collaboration -- 13.2.2 Phase II-Discourse Analysis: Computational Thinking -- 13.2.3 Phase III-Descriptive Statistics: Roles -- 13.2.4 Phase IV-Difficulty Score Calculation: Learning Outcomes -- 13.3 Results -- 13.3.1 Role Transitions -- 13.3.2 Collaboration -- 13.3.3 Computational Thinking -- 13.4 Discussion -- References -- 14 Video Games: A Potential Vehicle for Teaching Computational Thinking -- 14.1 Introduction -- 14.2 Computational Thinking Skills -- 14.3 Methodology -- 14.4 Results and Discussion -- 14.5 Implications for Educators and Researchers -- Appendix 1: Survey-Video Game Experience -- Appendix 2: Homework Exercise-Describing My Favourite Game -- References -- 15 Transforming the Quality of Workforce in the Textile and Apparel Industry Through Computational Thinking Education -- 15.1 Introduction -- 15.1.1 Business Challenges and Opportunities -- 15.1.2 People Challenges -- 15.2 "You Can Code" Campaign (2015−2016) -- 15.2.1 Champaign Design and Implementation -- 15.2.2 Value Created from the Campaign -- 15.2.3 Employee Empowerment-From Reactive to Proactive, from Follower to Owner -- 15.3 From Computational Thinking to Computational Action -- 15.3.1 Development of Esquel Carpool App -- 15.3.2 The Idea of Esquel Carpool App -- 15.3.3 Impact from Esquel Carpool App. , 15.4 From Programming to Internet of Things.
    Weitere Ausg.: Print version: Kong, Siu Cheung Computational Thinking Education Singapore : Springer Singapore Pte. Limited,c2019 ISBN 9789811365270
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Electronic books. ; Aufsatzsammlung ; Aufsatzsammlung
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: OAPEN
    URL: OAPEN
    URL: OAPEN
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    almahu_BV013793725
    Umfang: Online-Ressource.
    Anmerkung: Gesehen am 05.09.12
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe International Conference on Architectural Support for Programming Languages and Operating Systems Proceedings / International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS ...) Washington, DC : Computer Soc. Pr. [u.a.], 1987-1989
    Sprache: Englisch
    Schlagwort(e): Zeitschrift ; Konferenzschrift ; Zeitschrift ; Konferenzschrift ; Zeitschrift ; Konferenzschrift ; Zeitschrift ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    New York, NY :ACM Press, ; 1.1992 - 2.1993
    UID:
    almahu_BV013389649
    Umfang: Online-Ressource.
    ISSN: 1557-7384
    Serie: ACM digital library
    Anmerkung: Gesehen am 11.06.2020
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe Association for Computing Machinery ACM letters on programming languages and systems New York, NY : ACM Press, 1992-1993 ISSN 1057-4514
    Später: Aufgeg. in Association for Computing Machinery ACM transactions on programming languages and systems
    Sprache: Englisch
    Schlagwort(e): Programmiersprache ; Zeitschrift ; Online-Ressource ; Zeitschrift ; Zeitschrift ; Zeitschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    almahu_9949602262502882
    Umfang: 1 online resource (515 pages)
    Ausgabe: 1st ed.
    ISBN: 9781484228968
    Anmerkung: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Weitere Ausg.: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Sprache: Englisch
    Fachgebiete: Informatik , Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    UID:
    edoccha_BV048918404
    Umfang: 1 Online-Ressource.
    ISBN: 978-3-031-30044-8
    Serie: Lecture notes in computer science 13990
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-3-031-30043-1
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Konferenzschrift
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg :Springer Berlin Heidelberg,
    UID:
    almahu_9947920876902882
    Umfang: IX, 217 p. , online resource.
    ISBN: 9783540386841
    Serie: Lecture Notes in Computer Science, 160
    Anmerkung: 1. Language, logical foundation, verification -- 2. System supports for modular programming -- 3. Strategies and techniques for interactive proof -- 4. Supports for building modules, modulebase -- 5. Language processing -- 6. Verification system -- 7. Proof system -- 8. Supports for cooperative modular programming -- 9. Program development witht he IOTA system — KWIC example.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783540126935
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg :Springer Berlin Heidelberg,
    UID:
    almahu_9947920996902882
    Umfang: XX, 384 p. , online resource.
    ISBN: 9783540358367
    Serie: Lecture Notes in Computer Science, 61
    Anmerkung: On the formalization of programming languages: Early history and main approaches -- Programming in the meta-language: A tutorial -- The meta-language: A reference manual -- Denotational semantics of goto: An exit formulation and its relation to continuations -- A formal definition of ALGOL 60 as described in the 1975 modified report -- Software abstraction principles: Tutorial examples of an operating system command language specification and a PL/I-like on-condition language definition -- References & bibliography.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783540087663
    Sprache: Englisch
    Fachgebiete: Informatik , Wirtschaftswissenschaften
    RVK:
    RVK:
    Schlagwort(e): Aufsatzsammlung
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Cham :Springer Nature Switzerland :
    UID:
    almahu_9949850812002882
    Umfang: XXXII, 701 p. 127 illus., 102 illus. in color. , online resource.
    Ausgabe: 1st ed. 2024.
    ISBN: 9783031538773
    Serie: CSR, Sustainability, Ethics & Governance,
    Inhalt: This book brings together research that advances our ‎understanding of the fundamental relationship between board diversity and different ‎aspects of corporate governance, including corporate governance disclosures, board ‎performance, governance characteristics, and ownership structure. ‎The expertly selected chapters deal with related (but not limited) to the following topics: ‎Corporate governance models and diversity; forms of diversity and decisions in the boardroom; Board diversity, corporate disclosure, and intellectual capital disclosures; shareholder activism; differences between private and family firms; Board diversity laws; gender and ethnicity on boards, and going beyond gender aspects of diversity. This book is particularly useful for researchers and practitioner think tanks to understand the state of the art in board diversity research.
    Anmerkung: Effect of Reporting and Governance on Performance, with Online Digital Media as Moderating among Malaysian Waqf Institutions: A Pilot Study -- Young Talent Development Challenges: The Characteristics Of Indonesian Generation Z In Determining Their Job -- Workcation in Smart Tourism: Measuring Impact on Employees Well-being, Performance, and Engagement for Business Competitiveness -- The Level of Digital Competence and its Relationship to the Quality of E-learning among Faculty Members in Jordanian Universities -- Client's Intention and Their Willingness To Participate At The Rehabilitation Centre: Focusing On Malaysian Women's Perspective -- Rebuilding Malaysia's tourism industry Global effects of the Covid 19 pandemic and its resurgence strategies -- Impact of COVID-19 on Agile Software Development -- Professional Character Development in Islamic Military Leadership: Developing a Theoretical Framework -- A Self-Efficacy Sign Language Web Prototype: MUTAPP -- The Relationship Between MarketPenetration and Performance of Selected Small and Medium Enterprise -- Innovative Solution For Kids With Diabetes: Augmented Reality Mobile Application For Insulin Intake -- Should Torture be Justified in an Extreme Circumstances to Prevent Terrorism? -- Correlational Analyses of Mathematics Anxiety and Mathematics Performance -- Unraveling Social Medias Issues on Public Opinion and Activism: A Thematic Review -- Recycling Awareness Through Mobile Application: Selecting The Categories Of Recyclable Materials For Environmental Well Being -- From Grades to the Workplace: Unveiling the Link between Academic Performance and Internship Success -- The Impact of Colour Vision Defects on Travel Destination Selection -- The Effect of Green Marketing Mix on Customer Psychological Attitudes and Purchase Intention Within the Beauty Industry in Mauritius -- Factors Affecting Graduates Employability Skills: Quantitative Study on Employees in Brunei -- Exploring Gender and Race Discrimination in Recruitment for Extractive Industries in Mozambique -- Factors Influencing the Adoption E-Services in Oman Higher Education Sector -- Advancements in Technology for Pharmaceutical Packaging: A Review of Technology, Contributions and Applied Areas -- The Effect of Supply Chain Innovation on Corporate Sustainability and Performance -- The Impact of Guerilla Marketing Strategies on Business Performance and Sustainable Competitive Advantage of SMEs in Pakistan -- Strategic Improvement Model on Document Management Process for a Non-Digital Hospital -- Automated Irrigation System for Paddy Field -- Graduate Employability in Malaysia: The Influencing Factors for Malaysian Tertiary Students -- Enhancing Pandemic Safety with MobileNetV2: Real-time Facemask Detection -- Factors Influencing Online Banking Satisfaction In Malaysia -- Developing a Structural Model for Lifelong Music Learning Intention among Chinese University Students -- A Structured Literature Review on the Modelling Educational Video for Student Learning in Higher Education Institution -- The Had Kifayah Model for Asnaf Students at UiTM Kelantan Branch -- Mapping the Landscape: A Bibliometric Review Of Food Security Research In Malaysia -- Capital Structure Determinants of Bursa Malaysia PN17 Firms -- Preparing Practical Learning Through the Development of Education for Sustainable Development, ESD EDU Simulator -- The Alarming Shift from Earnings Management to Fraudulent Reporting -- Beyond Aesthetics: Reviews on Industrial Design Students' Creative Process Upon Developing Cultural-Oriented Products -- The effect of population growth and production on shallot prices in East Java Province in 2014-2022 -- The Concept of Islamic Spiritualism in Dealing With Plague and Infectious Disease Outbreaks -- Key Determinants of Slow Fashion (Batik) Apparel Purchase Intention among Malaysian Consumers: A Conceptual Paper -- Moolang Virtual Classroom: A Comparative of Students' Learning Preferences and Gender on Learning Outcomes -- Implementation of the Financial Technology Industry on MSMEs in Malang, Indonesia; A Phenomenological Analysis using Critical Thinking Model -- Transformation of Accounting Information Systems in the Management of BUMDesa Financial Performance in the Digitalization Era -- A Serious Game for Jawi Alphabets Literacy Based on Gamification Elements -- Deep Learning Model using Long Short- Term Memory (LSTM) for Time-series Forecasting of Traffic Volume in Malaysia -- Integrating Technology into Interior Design Education: A Paradigm Shift in Teaching and Learning -- Dissemination of Teaching Excellence in the Quality Process of Accreditation in Higher Education -- Will Metaverse Bridge the Gap between Authentic Education and Virtual Education? -- The role of administrative control in upgrading the localities -- The Reality of the Quality of Education in Postgraduate Programs at Palestine Technical University - Kadoorie from Students' Point of View -- Dewey's and Freire's ideas about dialogue and communication and their implications for student engagement in applied learning -- The effect of Strategic Management Accounting Techniques (SMAT) as an accounting technology on improving Business performance : A Review from Contigency and Resource Based View Approach -- Global Smuggling Research Trends: A Bibliometric Analysis of an Untold Story -- The Indicators of Happiness Among Academicians: A Systematic Literature Review (SLR) Analysis -- The Analysis Of Sustainability Development Among Msmes: Normative Pillar And Cultural-Cognitive Pillar -- The Impact of Presenteeism on Employee Productivity: A literature review.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783031538766
    Weitere Ausg.: Printed edition: ISBN 9783031538780
    Weitere Ausg.: Printed edition: ISBN 9783031538797
    Sprache: Englisch
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz