intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Trusted systems

Xem 1-20 trên 144 kết quả Trusted systems
  • Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and other contents.

    pdf402p muasambanhan10 11-04-2024 1 0   Download

  • Part 2 book "Internet security - Cryptographic principles algorithms protocols" includes content: Public-key infrastructure; network layer security; transport layer security - SSLv3 and TLSv1; electronic mail security - PGP, S/MIME; internet firewalls for trusted systems, SET for E-commerce transactions.

    pdf205p longtimenosee08 31-03-2024 2 0   Download

  • Ebook Mobile wireless network security privacy Part 1 includes contents: Chapter 1 research directions in security and privacy for mobile and wireless networks; chapter 2 pervasive systems: enhancing trust negotiation with privacy support; chapter 3 applying trust in mobile and wireless networks; chapter 4 a framework for computing trust in mobile ad-hoc networks; chapter 5 the concept of opportunistic networks and their research challenges in privacy and security.

    pdf129p longtimenosee05 31-03-2024 0 0   Download

  • Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource and information sharing dramatically changes the approaches to access control.

    pdf461p longtimenosee05 31-03-2024 2 0   Download

  • The significant objective of this study therefore centres on how to improve trust using extended technology acceptance model (e-TAM) by incorporating perceived security and e-trust with perceived usefulness and perceived ease of use to predict adoption of e-banking.

    pdf11p longtimenosee07 29-03-2024 2 2   Download

  • The main purpose of the current paper is to examine impact of information system, supplier integration and transformational leadership on supply chain performance. Moreover, mediating role of trust is examined as well. For the present research study, the data was gathered from the employees of mining industry of Indonesia.

    pdf8p longtimenosee07 29-03-2024 2 2   Download

  • There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.

    pdf482p longtimenosee03 22-02-2024 2 2   Download

  • Ebook Hacking exposed Linux: Linux security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 applying security, Chapter 2 applying interactive controls, Chapter 3 applying process controls, Chapter 4 local access control, Chapter 5 data networks security, Chapter 6 unconventional data attack vectors, chapter 7 voice over IP, chapter 8 wireless networks, chapter 9 input/output devices, chapter 10 RFID radio frequency identification, chapter 11 emanation attacks, chapter 12 trusted computing.

    pdf397p haojiubujain010 14-12-2023 3 1   Download

  • Continued part 1, part 2 of ebook "Water accounting: International approaches to policy and decision-making" provides readers with contents including: contemporary issues addressed by water accounting; the impossible planetary trust; water accounting, corporate sustainability and the public interest; water accounting and confl ict mitigation; the role of a water accounting system in the avoidance and resolution of international water disputes;...

    pdf132p tuongnhuoclan 27-11-2023 3 3   Download

  • Continued part 1, part 2 of ebook "Demystifying Internet of Things security: Successful IoT device/edge and platform security deployment" provides readers with contents including: chapter 4 - IoT software security building blocks; chapter 5 - connectivity technologies for IoT; chapter 6 - IoT vertical applications and associated security requirements;...

    pdf275p tieulangtran 28-09-2023 4 2   Download

  • Continued part 1, part 2 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: privacy at the next level: intel’s enhanced privacy identification (EPID) technology; boot with integrity, or don’t boot; trust computing, backed by the intel platform trust technology; unleashing premium entertainment with hardware-based content protection technology; breaking the boundaries with dynamically loaded applications;...

    pdf143p tieulangtran 28-09-2023 3 2   Download

  • Ensuring secure transmission and good quality of service (QoS) are key commercial concerns in ad hoc wireless networks as their application in short range devices, sensor networks, control systems, and other areas continues to develop. Focusing on practical potential solutions, this text covers security and quality of service in ad hoc wireless networks.

    pdf196p haojiubujain06 05-09-2023 6 2   Download

  • Ebook "Security concepts" includes contents: Metadata, security properties, security models, security concepts, economics of security, adversary modeling, threat modeling, physical security, hardware security, distributed systems, identification and authentication, authorization - access control, secure system administration, logging, reporting, abuse detection, abuse response, forensics, privacy, intrusion response, network security, email security, web security, software security, human factors and usability, attack patterns, trust and personnel security, cryptography, randomness and unpr...

    pdf246p haojiubujain06 05-09-2023 3 2   Download

  • This paper is to present a novel model of estimating trustworthiness of a truster on a trustee based on experience trust and reputation trust from some community within the context of user’s topic interests.

    pdf17p vimulcahy 18-09-2023 5 4   Download

  • Ebook Handbook of research on wireless security Part 2 includes contents: Security in mobile ad hoc networks, Privacy and anonymity in mobile ad hoc networks, Secure routing with reputation in MANET, Trust management and context-driven access control, A survey of key management in mobile ad hoc networks, Security measures for mobile ad-hoc networks (MANETs), A novel secure video surveillance system over wireless ad-hoc networks,…

    pdf413p haojiubujain06 05-09-2023 4 3   Download

  • Ebook Security in wireless mesh networks: Part 1 includes contents: Chapter 1 an introduction to wireless mesh networks; chapter 2 mesh networking in wireless PANs, LANs,MANs, and WANs; chapter 3 attacks and security mechanisms; chapter 4 intrusion detection in wireless mesh networks; chapter 5 secure routing in wireless mesh networks; chapter 6 hop integrity in wireless mesh networks; chapter 7 privacy preservation in wireless mesh networks; chapter 8 providing authentication, trust, and privacy in wireless mesh networks; chapter 9 non-interactive key establishment in wireless mesh network...

    pdf357p haojiubujain06 06-09-2023 5 4   Download

  • Ebook Security, privacy, and trust in modern data management: Part 1 includes contents: Chapter 1 privacy and security issues in a digital world, chapter 2 privacy in the law, chapter 3 ethical aspects of information security and privacy, chapter 4 authorization and access control, chapter 5 role-based access control, chapter 6 XML security, chapter 7 database security, chapter 8 trust management, chapter 9 trusted platforms, chapter 10 strong authentication with physical unclonable functions,…

    pdf259p haojiubujain06 06-09-2023 4 3   Download

  • Ebook Security, privacy, and trust in modern data management: Part 1 includes contents: chapter 17 an introduction to digital rights management systems, chapter 18 copy protection systems, chapter 19 forensic watermarking in digital rights management, chapter 20 person-based and domain-based digital rights management, chapter 21 digital rights management interoperability, chapter 22 DRM for protecting personal content, chapter 23 enhancing privacy for digital rights management,… Please refer to the documentation for more details.

    pdf208p haojiubujain06 06-09-2023 3 3   Download

  • Ebook Web services security and e-business: Part 2 includes contents: Chapter X Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues; Chapter XI An introductory study on business intelligence security; Chapter XII Secure trust transfer using chain signatures; Chapter XIII Distributed intrusion detection systems: An overview;…

    pdf210p haojiubujain06 06-09-2023 9 3   Download

  • Machine Reading Comprehension (MRC) is a great NLP task that requires concentration on making the machine read, scan documents, and extract meaning from the text, just like a human reader one of the MRC system challenges is not only having to understand the context to extract the answer but also being aware of the trust-worthy of the given question is possible or not.

    pdf9p viberkshire 09-08-2023 4 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2