Browse Results

Showing 13,901 through 13,925 of 17,275 results

Security in Embedded Devices

by Catherine H. Gebotys

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. However now they must additionally deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites.

Security in Next Generation Mobile Networks: SAE/LTE and Wimax (River Publishers Series In Standardisation Ser.)

by Anand R. Prasad Seung-Woo Seo

Starting from voice services with simple terminals, today a mobile device is nothing sort of a small PC in the form of smart-phones. The result has been a huge increase in data-services giving mobile communication access to critical aspects of human society / life. This has led to standardization of SAE/LTE (System Architecture Evolution / Long Term Evolution) by 3GPP and IEEE 802.16e / WiMAX. Together with penetration of mobile communications and new standardization come new security issues and thus the need for new security solutions. This book provides a fresh look at those security aspects, with main focus on the latest security developments of 3GPP SAE/LTE and WiMAX. SAE/LTE is also known as Evolved Packet System (EPS).The intended audience for this book is mobile network and device architects, designers, researchers and students. The goal of the authors, who have a combined experience of more than 25 years in mobile security standardization, architecture, research, and education, is to provide the book?s readers with a fresh and up-to-date look at the architecture and challenges of EPS and WiMAX security.

Security in Smart Home Networks (Wireless Networks)

by Yan Meng Haojin Zhu Xuemin (Sherman) Shen

This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.

Security in Wireless Communication Networks (IEEE Press)

by Yi Qian Feng Ye Hsiao-Hwa Chen

Receive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the field Security in Wireless Communication Networksdelivers a thorough grounding in wireless communication security. The distinguished authors pay particular attention to wireless specific issues, like authentication protocols for various wireless communication networks,encryption algorithms and integrity schemes on radio channels, lessons learned from designing secure wireless systems and standardization for security in wireless systems. The book addresses how engineers, administrators, and others involved in the design and maintenance of wireless networks can achieve security while retaining the broadcast nature of the system, with all of its inherent harshness and interference. Readers will learn: A comprehensive introduction to the background of wireless communication network security, including a broad overview of wireless communication networks, security services, the mathematics crucial to the subject, and cryptographic techniques An exploration of wireless local area network security, including Bluetooth security, Wi-Fi security, and body area network security An examination of wide area wireless network security, including treatments of 2G, 3G, and 4G Discussions of future development in wireless security, including 5G, and vehicular ad-hoc network security Perfect for undergraduate and graduate students in programs related to wireless communication, Security in Wireless Communication Networks will also earn a place in the libraries of professors, researchers, scientists, engineers, industry managers, consultants, and members of government security agencies who seek to improve their understanding of wireless security protocols and practices.

Security Incidents & Response Against Cyber Attacks (EAI/Springer Innovations in Communication and Computing)

by Akashdeep Bhardwaj Varun Sapra

This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry.

Security Issues in Fog Computing from 5G to 6G: Architectures, Applications and Solutions (Internet of Things)

by Chintan Bhatt Yulei Wu Saad Harous Massimo Villari

The book provides an examination of how fog security is changing the information technology industry and will continue to in the next decade. The authors first discuss how fog enables key applications in wireless 5G, the Internet of Things, and big data. The book then presents an overview of fog/edge computing, focusing on its relationship with cloud technology, Internet of Things and the future with the use of secure 5G/6G communication. The book also presents a comprehensive overview of liabilities in fog/edge computing within multi-level architectures and the intelligent management. The last part of the book reviews applications of fog/edge computing in smart cities, including in Industrial IoT, edge-based augmented reality, data streaming, and blockchain-based.

The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Internal Audit And It Audit Ser.)

by Jeffrey W. Brown

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a “communication theory” book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

Security of Block Ciphers: From Algorithm Design to Hardware Implementation (Wiley - IEEE)

by Kazuo Sakiyama Yu Sasaki Yang Li

A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis Written by authors known within the academic cryptography community, this book presents the latest developments in current research Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach - algorithm to implementation – covers security from start to completion Deals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cryptanalysis and practical applications of side-channel analysis

Security of Mobile Communications

by Noureddine Boudriga

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels-from subscriber to network operator to service provider. Providing technicians and designers with a critical and comprehens

Security, Privacy and Reliability in Computer Communications and Networks

by Kewei Sha Aaron Striegel Min Song

Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the numerous threat and privacy concerns. New research technologies are essential to preserve privacy, prevent attacks, and achieve the requisite reliability. Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols. Technical topics discussed in the book include: Vulnerabilities and Intrusion DetectionCryptographic Algorithms and EvaluationPrivacyReliable Routing ProtocolsThis book is ideal for personnel in computer communication and networking industries as well as academic staff and collegial, master, Ph.D. students in computer science, computer engineering, cyber security, information insurance and telecommunication systems.

Security, Privacy and Trust in Cloud Systems

by Mukaddim Pathan Surya Nepal

The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniques, case studies covering both social and technological aspects, and advanced platforms. - Case studies written by professionals and/or industrial researchers. - Inclusion of a section on Cloud security and eGovernance tutorial that can be used for knowledge transfer and teaching purpose. - Identification of open research issues to help practitioners and researchers. The book is a timely topic for readers, including practicing engineers and academics, in the domains related to the engineering, science, and art of building networks and networked applications. Specifically, upon reading this book, audiences will perceive the following benefits: 1. Learn the state-of-the-art in research and development on cloud security, privacy and trust. 2. Obtain a future roadmap by learning open research issues. 3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems.

Security Protocols XXIII

by Jonathan Anderson Frank Stajano James Malcolm Vashek Matyáš Petr Švenda Bruce Christianson

This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Information Security in Fiction and in Fact".

Security, Trust and Privacy Models, and Architectures in IoT Environments (Internet of Things)

by Lidia Fotia Fabrizio Messina Domenico Rosaci Giuseppe M. L. Sarné

This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments. The authors aim to capture the latest research and contributions from academy, industry, and other stakeholders on new security models, architectures, protocols, and standards for ensuring security, privacy, and trustworthiness to IoT systems. The authors discuss the convergence of IoT, software agents, and edge computing to introduce social features into IoT systems, combining trustworthiness and reputation information collected by agents at the edge with security and privacy mechanisms. They also cover experimental and simulated campaigns that evaluate strategies to improve the security and privacy of the IoT world, and at the same time the ability to prevent and deter deceptive behaviors. The book is relevant for researchers, professionals, academics, and students.

See Naples and Die

by Penelope Green

The second book in a much loved Italian travel memoir trilogy which also includes the delightful When in Rome and Girl by Sea.After three years living and working in Italy, Australian journalist Penelope Green needs a reason to stick around - true love or gainful employment.When a job comes up in Naples - crime capital of Italy, home of pizza and the Camorra, and crouched at the foot of a volcano - Penny launches herself into the unknown.With her innate curiosity and eye for detail, Penny prises Naples open to show us the real city, in all its splendour... and all its depravity. She uncovers a chaotic metropolis when crime and poverty blur with abundant natural beauty, and where the shadow of Mount Vesuvius is a daily reminder that life must be lived for the moment.And when Penny meets a bass player in a local band, she thinks she might have found that other reason to stick around.'This is a bewitching, true tale of a tantalising city. Magnifico!' - Marie Claire'frank, funny and honest' - Notebook'Her down to earth tone and genuine curiosity make for an interesting and insightful read' - Sun-HeraldAuthor BiographyPenelope Green was born in Sydney and worked as a print journalist around Australia for a decade before moving to Rome in 2002. Her first book, When in Rome, recounts her early experiences in the Eternal City. In 2005 she moved to Naples to work for ANSAmed, a Mediterranean news service. She found an apartment in the city's colourful Spanish Quarter, worked hard at mastering the Neapolitan dialect, and writing her second travel memoir, See Naples and Die. Girl by Sea completes Penny's Italian experience as she moves to the idyllic island of Procida, across the bay from Capri, with her Italian partner, Alfonso. The couple have now returned to Australia, where they are making a new life for themselves back in the Southern hemisphere. For more information visit penelopegreen.com.au

Seeing: A Memoir of Truth and Courage from China's Most Influential Television Journalist

by Chai Jing

In the tradition of Katy Tur, Jane Pauley, and Peter Jennings, Chai Jing shows us the power of television news and the complex challenges of reporting in China.After becoming a radio DJ in college and a TV interviewer at 23, Chai Jing is thrust into the spotlight when she takes on a position as a news anchor at CCTV, China&’s official state news channel. Chai struggles to find her role in a male-dominated news organization, discovering corruption, courage, and hope within the people she meets while honing her talent for getting people to reveal themselves to her.In eleven propulsive and deeply felt chapters, Chai recounts her investigations into SARS quarantine wards, a childhood suicide epidemic, the human cost of industrial pollution, and organized crime, while looking back at her growth as a journalist. Chai Jing shares the philosophical and emotional complexity of the ethical challenges that are always present in such revealing reporting, while she also finds hope and purpose, time and again, in the vital and intimate stories of her interviewees.This candid memoir from one of China&’s best-known journalists provides a rare window into the issues which concern us most, and which face contemporary China and the whole world.

Seek: How Curiosity Can Transform Your Life and Change the World

by Scott Shigeoka

Maximize your potential for connection, healing, and personal growth with this &“timely bridge for our divided world.&” (Adam Grant, #1 New York Times bestselling author of Hidden Potential)"We've been hiding from each other for far too long. Seek offers us an empathic, practical, and heartfelt road map forward." ―Seth Godin, author of The Song of Significance and Tribes If you've felt alienated and alone in recent years, you're in good company. Whether it's a rift in your family, polarization at your workplace or just a sense that society isn't as connected as it once was, many of us feel painful chasms in our connections. Internationally-recognized curiosity expert and bridge builder Scott Shigeoka knows that there&’s only one cure: Deep Curiosity. Rooted in a desire to understand, rather than to know, a practice of Deep Curiosity can help us leverage something we think of as an intellectual force or personality trait into a heart-centered daily practice to transform our well-being and our lives. In Seek, Shigeoka blends cutting-edge research with electric, vulnerable storytelling to teach readers their signature DIVE model. With his guidance, you&’ll learn more than a dozen practical strategies to: Detach — Let go of your ABCs (assumptions, biases, certainty), Intend — Prepare your mindset and setting, Value — See the dignity of every person, including yourself, Embrace — Welcome the hard times in your life. &“Energizing, creative, and exciting&” (Gretchen Rubin), Seek is a revolutionary playbook to heal division, loneliness, estrangement, hatred, and our most urgent societal challenges.

Seeking and Resisting Compliance: Why People Say What They Do When Trying to Influence Others

by Steven R. Wilson

Why do individuals say what they do during everyday face-to-face influence interactions? How do people seek or resist compliance in different relational, institutional, and cultural contexts? Linking theory and research to salient, real life examples and recent academic studies, Steven Wilson introduces the reader to the theories, systems of message analysis, complexities and nuances of interpersonal persuasion. Seeking and Resisting Compliance is the only single-authored, interdisciplinary text to explore compliance gaining and resistance from a message production perspective. This incisive, clearly written text is ideal for students, scholars, and anyone interested in interpersonal influence and persuasion in everyday interactions. Recommended for graduate and upper-level undergraduate courses in persuasion as well as special topics courses in interpersonal influence, social psychology, and sociolinguistics. Features of this text: Ground breaking, specific focus on message production as opposed to only message effects. Multiple theoretical perspectives are presented and the vast body of research from communication, psychology, linguistics, philosophy and related fields is reviewed. Student-friendly pedagogy, such as definitions, examples, and sections describing "common assumptions" about various theories engage students and highlight important concepts. Steven Wilson currently is an Associate Professor and Director of Graduate Studies in the Department of Communication at Purdue University. He is one of five associate editors for the interdisciplinary journal Personal Relationships, and past chair of the International Communication Association′s Interpersonal Communication division. His research and teaching focus on interpersonal influence and message production in a variety of contexts, from parent-child interaction in abusive families to intercultural business negotiations. He has published nearly forty articles and book chapters on these topics.

Seeking Equity for Women in Journalism and Mass Communication Education: A 30-year Update (Routledge Communication Series)

by Ramona R. Rush, Carol E. Oukrop and Pamela J. Creedon

This volume concentrates on the study and efforts of women and minority men to gain respect and parity in journalism and mass communication, and focuses on trends over the past three decades. Contributions to the volume provide a history of the equity efforts and offer updates on equity in the academy and in the professions. Theoretical and international perspectives on equity are also included, as are the concerns about equity from the new generations now coming into the profession. This anthology serves as a benchmark of women's current status in journalism and mass communication and provides a call to action for the future. As such, it is required reading for all concerned with establishing equity throughout the discipline.

Seeking Light

by Paul Grabhorn

A profoundly moving collection of unforgettable photographs from conflict zones around the world Paul Grabhorn's stunning four-color photographs tell an amazing, essential story--one of hope in the face of violence and deplorable conditions, of dignity in the midst of degradation, of light in the darkness of war and suffering. Taken on his travels with the International Committee of the Red Cross (ICRC), Grabhorn's captivating images allow readers to witness the activities that occur every day in places that the rest of the world has forgotten or has chosen to ignore. In war-torn countries such as Chechnya, Bosnia, Croatia, and Somalia, the humanitarian work Grabhorn documents is a testament to human compassion and community. Here are the helpers, quietly working day to day to alleviate the suffering of those caught up in conflict wherever it erupts. In many parts of the world, hope may sometimes seem in short supply. Grabhorn's photographs are an inspiring reminder of the resiliency and the unlimited capacity of the human spirit.

Seeking Truth in International TV News: China, CGTN and the BBC (Routledge Advances in Internationalizing Media Studies)

by Vivien Marsh

This book puts CGTN (formerly CCTV-News) and the BBC’s international television news head-to-head, interrogating competing ‘truths’ in the exacting business of news reporting. Written by a media scholar and former long-serving BBC News journalist, Seeking Truth in International TV News asks if China’s English-language television news programmes are little more than state propaganda, and if the BBC can be viewed as a universal news standard to which all other broadcasters should aspire. Over 8 years of Xi Jinping’s rule, it investigates how the international TV news channels of CGTN and the BBC reported on Chinese politics, protests in Hong Kong, disasters, China in Africa, and insurgency and its suppression in Xinjiang. The comparison reveals uneven editorial imperatives at the Chinese broadcaster and raises questions about the BBC’s professed tenets of balance and impartiality. It also illustrates how Chinese journalists commit ‘small acts of journalism’ that push the boundaries of information control. A rigorous analysis of reportage from the two channels, this book will be relevant to scholars of global media, journalism, international relations and public diplomacy. It will also interest those in academia, the media and international affairs who want to examine the nature of news and ‘soft power’ in a comparative context.

Segundo libro de crónicas

by António Lobo Antunes

La vida en todas sus formas, las anécdotas de infancia y el recuerdo de amigos desaparecidos, una calle de Lisboa... La vida en todas sus formas, las anécdotas de infancia y el recuerdo de amigos desaparecidos, una calle de Lisboa, un árbol en el jardín familiar, un viaje a Italia, una noche en un hotel de Munich, la entrega de un premio literario, la inspiración, la dificultad de escribir... La vida de António Lobo Antunes en todos sus aspectos conforma el universo de las crónicas que el autor portugués viene ofreciendo desde hace años en distintas publicaciones periódicas de todo el mundo. Estas crónicas, y las que se publicarán en sucesivos volúmenes, representan lo más parecido a la autobiografía de uno de los escritores cruciales del panorama literario mundial. Reseña:«En este Segundo libro de crónicas, encontraremos, para los más escépticos y reticentes aún, algunas de las mejores muestras, recetas concentradas o elíxires con los que paladear de forma adecuada al que es considerado normalmente como uno de los escritores vivos más importantes.»ABC Cultural

Selbstgewiss ins Ungewisse: Auftragskommunikation in der Krise (essentials)

by Andreas Galling-Stiehler Jürgen Schulz Robert Caspar Müller

​Das letzte Jahrzehnt war geprägt von globalen Krisen: Finanz-, Flüchtlings-, Klima- und die Corona-Pandemiekrise haben Gewissheiten in Frage gestellt. In Gesellschaft, Wirtschaft und Politik wurde und wird von Menschen eine Anpassung an neue Bedingungen gefordert. Transformation erscheint als Gebot der Stunde. Dazu braucht es den Mut von Menschen und Organisationen, Bedrohungen entgegenzutreten sowie den vitalen Willen, Chancen zu ergreifen. Voraussetzung dafür ist Selbstgewissheit. Das Problem: Ungewisse Zeiten sind meist keine selbstgewissen. Es braucht den Austausch mit anderen Menschen, um Risiken gemeinsam einzugehen. Wir müssen uns mit den neuen Bedingungen ebenso vertraut machen wie mit- und untereinander, um zu neuen Gewissheiten zu gelangen. Anstatt Verständigung zu fördern, setzen Politik und Wirtschaft auf das Gegenteil: Paternalismus und Verhaltensökonomie sollen die Sinnsuche verkürzen. Das Gespräch soll durch sein Ergebnis ersetzt werden. Das ist eine Transformation, die auf Anpassungsdruck und Drohung setzt, weil sie Menschen wie Organisationen einen Wandel zum Guten letztlich nicht selbst zutraut. Die Autoren schlagen einen anderen Weg vor: selbstgewiss ins Ungewisse.

SELECT Series: Microsoft Word 2002, Brief Volume

by Yvonne Johnson

The Select Series: Steps for Success, Projects for Perspective. The Select family of texts boasts a lively look and feel that takes a step-by-step approach to teaching Word 2002 tasks. Not only does the student step through the tasks, but the emphasis on projects in this series gives the student practical knowledge of Word 2002. Microsoft Certified to the EXPERT level, these texts contain the depth of coverage your students need.

Selected Journalism 1850-1870

by Charles Dickens

Throughout his writing career Charles Dickens was a hugely prolific journalist. This volume of his later work is selected from pieces that he wrote after he founded the journal Household Words in 1850 up until his death in 1870. Here subjects as varied as his nocturnal walks around London slums, prisons, theatres and Inns of Court, journeys to the continent and his childhood in Kent and London are captured in remarkable pieces such as 'Night Walks', 'On Strike', 'New Year's Day' and 'Lying Awake'. Aiming to catch the imagination of a public besieged by hack journalism, these writings are an extraordinary blend of public and private, news and recollection, reality and fantastic description.

Selected Letters of Martha Gellhorn

by Martha Gellhorn Caroline Moorehead

From Martha Gellhorn's critically acclaimed biographer, the first collected letters of this defining figure of the twentieth-centuryMartha Gellhorn's heroic career as a reporter brought her to the front lines of virtually every significant international conflict between the Spanish Civil War and the end of the Cold War. While Gellhorn's wartime dispatches rank among the best of the century, her personal letters are their equal: as vivid and fascinating as anything she ever published. Gellhorn's correspondence from 1930 to 1996—chronicling friendships with figures as diverse as Eleanor Roosevelt, Leonard Bernstein, and H. G. Wells, as well as her tempestuous marriage to Ernest Hemingway—paint a vivid picture of the twentieth century as she lived it. Caroline Moorehead, who was granted exclusive access to the letters, has expertly edited this fascinating volume, providing prefatory and interstitial material that contextualizes Gellhorn's correspondence within the arc of her entire life. The letters introduce us to the woman behind the correspondent—a writer of wit, charm, and vulnerability. The result is an exhilarating, intimate portrait of one of the most accomplished women of modern times.

Refine Search

Showing 13,901 through 13,925 of 17,275 results