Information Security, Hein Venter; Marianne Loock; Marijke Coetzee; Mari
Автор: Samir Kumar Bandyopadhyay; Wael Adi; Tai-hoon Kim; Название: Information Security and Assurance ISBN: 3642133649 ISBN-13(EAN): 9783642133640 Издательство: Springer Рейтинг: Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the refereed proceedings of the 4th International Conference on Information Security and Assurance, ISA 2010, held in Miyazaki, Japan, in June 2010.
Автор: Theo Tryfonas Название: Human Aspects of Information Security, Privacy and Trust ISBN: 3319584596 ISBN-13(EAN): 9783319584591 Издательство: Springer Рейтинг: Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Clinical and Health Information Systems.- Mobile-Application based Cognitive Behavior Therapy (CBT) for Identifying and Managing Depression and Anxiety.- The structure of clinical judgment making based on nurse's visual observation. -Towards a Clinical Support System for the Early Diagnosis of Sepsis. -APSEN: Pre-Screening Tool for Sleep Apnea in a Home Environment. - Tacit process for obtaining nursing skills: Focusing on nurse's sense of patients close to death.- Conversion of JPG Image into DICOM Image Format with One Click Tagging.- Eye Movement Differences between Novices and Expert Surgeons in Laparoscopic Surgery Simulator.- Evaluation Methods to Support Health Information Systems Development: a Framework Supported in Literature and Practical Experience. -Software Requirements Engineering in Digital Healthcare: A Case Study of the Diagnosis and Monitoring of Autism Spectrum Disorders in Children in the UK's National Health Service. - Compare the Receiver Operating Characteristic (ROC) and Linear Discriminant Analysis (LDA) for Acromegaly Detection by Three-Dimensional Facial Measurements.- Evaluation of Functionality and Usability on Diabetes Mobile Applications: A Systematic Literature Review.- Health and Aging. - Abductive cognitive support for (semantic) dementia persons.- Age and Computer Skill Level Difference in Aging-Centered Design: A Case Study of a Social Type Website. -Application and Effect of Media Therapy to the Recreational Activities at Group Homes Reduction of Emotional Pain of Elderly People with Dementia. -Investigation of Quantification of the Suitable Photos for Conversation Assistance for Elderly and Youth.- Generating Personalized Dialogue Towards Daily Counseling System for Home Dementia Care. -Color Affects the Usability of Smart Phone Icon for the Elderly. -Capturing Activities of Daily Living for Elderly at Home based on Environment Change and Speech Dialog.- F0 Feature Analysis of Communication between Elderly Individuals for Health Assessment. -A Study of Photographs as Communication Content for Intergenerational Conversation Support System. - Health Data Analytics and Visualization. - Measuring Insight Into Multi-dimensional Data from a Combination of a Scatterplot Matrix and a HyperSlice Visualization.- Effective visualization of long term health data to support behavior change. -That's so meta! Usability of a Hypergraph-based Discussion Model. - FlowChart Tool for Decision Making in Interdisciplinary Research Cooperation.- Using EEG Data Analytics to Measure Meditation. -Enhance the Use of Medical Wearables through Meaningful Data Analytics. - User-driven Semantic Classification for the Analysis of Abstract Health and Visualization Tasks.- EEG Features Extraction and Classification of Rifle Shooters in the Aiming Period. - Design for Safety.- Safety does not happen by accident, can gaming help improve occupational health and safety in organizations. - Autonomous robotic system for pipeline integrity inspection.- Interactive design of digital car dashboard interfaces. -Emergency Usability Lab - Concept to evaluate the usability of healthcare systems in emergencies.- Watch out! User-centered Feedback Design for a V2X-Smartphone App.- Safety Performance Evaluation Model for Airline Flying Fleets.- Deciphering Workers' Safety Attitudes by Sensing Gait Patterns.- Driving Process' Analysis and HUD design based on Conditional Autonomous Traffic Safety. -ECG Identification Based on PCA-RPROP.
Автор: Abhishek Chopra Название: Implementing an Information Security Management System ISBN: 1484254120 ISBN-13(EAN): 9781484254127 Издательство: Springer Рейтинг: Цена: 8384.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world.
Автор: Atul Prakash Название: Information Systems Security ISBN: 3642107710 ISBN-13(EAN): 9783642107719 Издательство: Springer Рейтинг: Цена: 10480.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: 5th International Conference ICISS 2009 Kolkata India December 1418 2009 Proceedings. .
Описание: These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference.
Название: Information Security Theory and Practice ISBN: 331924017X ISBN-13(EAN): 9783319240176 Издательство: Springer Рейтинг: Цена: 8665.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory and Practices, WISTP 2015, held in Heraklion, Crete, Greece, in August 2015.
Описание: Constitutes the refereed proceedings of the IFIP TC 11 23rd International Information Security Conference held at the 20th World Computer Congress in Milano, Italy on September 7-10, 2008. This book features proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields.
Описание: This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Security for Information Technology and Communications, SECITC 2016, held in Bucharest, Romania, in June 2016. The 16 revised full papers were carefully reviewed and selected from 35 submissions.
This volume constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security in Information Systems, CD-ARES 2016, and the Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, co-located with the International Conference on Availability, Reliability and Security, ARES 2016, held in Salzburg, Austria, in September 2016. The 13 revised full papers and 4 short papers presented were carefully reviewed and selected from 23 submissions. They are organized in the following topical sections: Web and semantics; diagnosis, prediction and machine learning; security and privacy; visualization and risk management; and privacy aware machine learning for health data science.
Автор: Theo Tryfonas; Ioannis Askoxylakis Название: Human Aspects of Information Security, Privacy, and Trust ISBN: 3319076191 ISBN-13(EAN): 9783319076195 Издательство: Springer Рейтинг: Цена: 11598.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas.
Автор: Tryfonas Название: Human Aspects of Information Security, Privacy, and Trust ISBN: 3319393804 ISBN-13(EAN): 9783319393803 Издательство: Springer Рейтинг: Цена: 7826.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
User Identification Using Games.- Hermes: Hands-Free Authentication in Physical Spaces.- Implicit Authentication for Mobile Devices Using Typing Behavior.- Fraud Protection for Online Banking - A User-Centered Approach on Detecting Typical Double-Dealings due to Social Engineering and Inobservance whilst Operating with Personal Login Credentials.- Vibration Based Tangible Tokens for Intuitive Pairing among Smart Devices.- Anonymous Authentication with a Bi-directional Identity Federation in the Cloud.- An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010:2011.- Secure Communication Protocol between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks.- Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia's Personal Health Information Act.- Information Security Application Design: Understanding Your Users.- Responsibility Modelling and Its Application Trust Management.- Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks.- Current Trend of End-users' Behaviors towards Security Mechanisms.- Share to Protect - Quantitative Study on Privacy Issues in V2X-Technology.- The Impact of Security Cues on User Perceived Security in E-Commerce.- Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret: Policy Lessons for Government after the Snowden Leaks.- Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective.- Assessing the Feasibility of Adaptive Security Models for the Internet of Things.- OpenStack Firewall as a Service Rule Analyser.- Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes.- Attack Tree Analysis for Insider Threats on the IoT Using Isabelle.- The State of Near-Field Communication (NFC) on the Android platform.- Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home.- A Taxonomy to Classify Risk End-user Profile in Interaction with the Computing Environment.- Security Middleware Programming Using P4.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru