top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Recent advances in intrusion detection [electronic resource] : 14th international symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011 : proceedings / Robin Sommer, Davide Balzarotti, Gregor Maier (eds.).
Recent advances in intrusion detection [electronic resource] : 14th international symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011 : proceedings / Robin Sommer, Davide Balzarotti, Gregor Maier (eds.).
Creatore [RAID (Symposium) (14th : 2011 : Menlo Park, Calif.)]
Estensione 1 online resource (x, 397 pages) : illustrations.
Disciplina 005.8
Accesso persona Sommer, Robin
Balzarotti, Davide
Maier, Gregor, 1979-
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data structures (Computer science)
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Computers and Society
Algorithm Analysis and Problem Complexity
Data Structures, Cryptology and Information Theory
ISBN 9783642236440
3642236448
9783642236433
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Minemu: The World's Fastest Taint Tracker / Erik Bosman, Asia Slowinska and Herbert Bos -- Dymo: Tracking Dynamic Code Identity / Bob Gilbert, Richard Kemmerer, Christopher Kruegel and Giovanni Vigna -- Automated Identification of Cryptographic Primitives in Binary Programs / Felix Gröbert, Carsten Willems and Thorsten Holz -- Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode / Yanick Fratantonio, Christopher Kruegel and Giovanni Vigna -- KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware / Stefano Ortolani, Cristiano Giuffrida and Bruno Crispo -- Packed, Printable, and Polymorphic Return-Oriented Programming / Kangjie Lu, Dabi Zou, Weiping Wen and Debin Gao -- On the Expressiveness of Return-into-libc Attacks / Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang and Vincent Freeh, et al. -- Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close / Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou and Salvatore J. Stolfo -- Revisiting Traffic Anomaly Detection Using Software Defined Networking / Syed Akbar Mehdi, Junaid Khalid and Syed Ali Khayam -- Modeling User Search Behavior for Masquerade Detection / Malek Ben Salem and Salvatore J. Stolfo -- Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack / Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru and Radu State -- Detecting Traffic Snooping in Tor Using Decoys / Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis and Angelos D. Keromytis -- Cross-Analysis of Botnet Victims: New Insights and Implications / Seungwon Shin, Raymond Lin and Guofei Gu -- Banksafe Information Stealer Detection Inside the Web Browser -- Armin Buescher, Felix Leder and Thomas Siebert -- IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM / Mario Heiderich, Tilman Frosch and Thorsten Holz --tSpam Filtering in Twitter Using Sender-Receiver Relationship / Jonghyuk Song, Sangho Lee and Jong Kim -- Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers / Chao Yang, Robert Chandler Harkreader and Guofei Gu -- Detecting Environment-Sensitive Malware / Martina Lindorfer, Clemens Kolbitsch and Paolo Milani Comparetti -- Defending Embedded Systems with Software Symbiotes / Ang Cui and Salvatore J. Stolfo -- What If You Can't Trust Your Network Card? / Loïc Duflot, Yves-Alexis Perez and Benjamin Morin.
Record Nr. NYU-004374102
[RAID (Symposium) (14th : 2011 : Menlo Park, Calif.)]  
Materiale a stampa
Lo trovi qui: New York University
Cloud computing and services science / Ivan Ivanov, Marten van Sinderen, Boris Shishkov, editors
Cloud computing and services science / Ivan Ivanov, Marten van Sinderen, Boris Shishkov, editors
Estensione 1 online resource (xv, 390 pages) : illustrations (some color).
Disciplina 004.6782
Accesso persona Ivanov, Ivan
Sinderen, Marten J. van, 1958-
Shishkov, Boris
Genere/Forma Electronic books
Soggetto non controllato Computer science
Information Systems
Engineering economy
Economics
Business planning
Management of Computing and Information Systems
Operations Research/Decision Theory
Organization/Planning
Business/Management Science, general
Engineering Economics, Organization, Logistics, Marketing
ISBN 9781461423263
1461423260
1461423252
9781461423256
Classificazione 54.79
85.15
54.32
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Invited Papers -- Object-Oriented Service Clouds for Transdisciplinary Computing / Michael Sobolewski -- From Service Innovation to Service Engineering / Wil Janssen, Marc Lankhorst, Timber Haaker and Henny de Vos -- Part 2. Cloud Computing Fundamentals -- Adaptive Overlay Approach on the Inter-Cloud Environment / Sumeth Lerthirunwong, Hitoshi Sato and Satoshi Matsuoka -- Securing Virtual and Cloud Environments / Mariana Carroll, Paula Kotzé and Alta van der Merwe -- Achieving Market Liquidity Through Autonomic Cloud Market Management / Ivan Breskovic, Michael Maurer, Vincent C. Emeakaroha, Ivona Brandic and Jörn Altmann -- Part 3. Services Science Foundation for Cloud Computing -- Cost-Performance Driven Resource Configuration for Database Applications in IaaS Cloud Environments / Shoubin Kong, Yuanping Li and Ling Feng.
Partitioning Workflows for Decentralized Execution / Adam Barker -- An Integrated Monitoring Infrastructure for Cloud Environments / Gregory Katsaros, Georgina Gallizo, Roland Kübert, Tinghe Wang and J. Oriol Fitó, et al. -- Service Development Abstraction: A Design Methodology and Development Toolset for Abstractive and Flexible Service-Based Software / Per-Olov Östberg and Erik Elmroth -- Cloud Computing Costs and Benefits / An IT Management Point of View / Nane Kratzke -- Part 4. Cloud Computing Platforms and Applications -- A Cloud Computing Medical Image Analysis and Collaboration Platform / Louis Parsonson, Soeren Grimm, Atif Bajwa, Laurence Bourn and Li Bai -- Applicability of NoSQL Databases to Mobile Networks: Case Home Location Register / Rasmus Paivarinta and Yrjo Raivio -- SLA-Based Planning for Multi-Domain Infrastructure as a Service / Kuan Lu, Thomas Röblitz, Peter Chronz and Constantinos Kotsokalis.
Scheduling On-demand SaaS Services on a Shared Virtual Cluster / Rodrigue Chakode, Jean-François Méhaut and Blaise-Omer Yenke -- Assessing Cloud Infrastructure Costs in Communications-Intensive Applications / Oleksiy Mazhelis, Pasi Tyrväinen, Kuan Eeik Tan and Jari Hiltunen -- Are Clouds Ready for Geoprocessing? / Hassan A. Karimi and Duangduen Roongpiboonsopit -- Part 5. Cloud Computing Enabling Technology -- A Performance Evaluation of Block I/O Paravirtualization and Virtual Machine Images / Django Armstrong and Karim Djemame -- Dynamic Resource Allocation for Multi-Tiered, Cluster-Based Web Hosting Environments / M. Al Ghamdi, A.P. Chester, L. He and S.A. Jarvis -- A Method for Experimental Analysis and Modeling of Virtualization Performance Overhead / Nikolaus Huber, Marcel von Quast, Fabian Brosig, Michael Hauck and Samuel Kounev -- The Partition Cost Model for Load Balancing in MapReduce / Benjamin Gufler, Nikolaus Augsten, Angelika Reiser and Alfons Kemper.
Record Nr. NYU-004375006
Materiale a stampa
Lo trovi qui: New York University
Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings / edited by Werner Schindler, Sorin A. Huss
Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings / edited by Werner Schindler, Sorin A. Huss
Creatore [COSADE 2012 (2012 : Darmstadt, Germany)]
Estensione 1 online resource (x, 264 pages) : illustrations (some color).
Disciplina 005.8/2
Accesso persona Schindler, Werner, 1963-
Huss, Sorin A. (Sorin Alexander)
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Computers and Society
ISBN 9783642299124
3642299121
3642299113
9783642299117
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Exploiting the Difference of Side-Channel Leakages / Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt and Stefan Mangard -- Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario / Thomas Korak, Thomas Plos and Michael Hutter -- 700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy / Mathias Wagner -- An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation / Wei He, Eduardo de la Torre and Teresa Riesgo -- An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers / Shohreh Sharif Mansouri and Elena Dubrova -- Conversion of Security Proofs from One Leakage Model to Another: A New Issue / Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner and Matthieu Rivain, et al. -- Attacking Exponent Blinding in RSA without CRT / Sven Bauer -- A New Scan Attack on RSA in Presence of Industrial Countermeasures / Jean Da Rolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes and Bruno Rouzeyre, et al.
RSA Key Generation: New Attacks / Camille Vuillaume, Takashi Endo and Paul Wooderson -- A Fault Attack on the LED Block Cipher / Philipp Jovanovic, Martin Kreuzer and Ilia Polian -- Differential Fault Analysis of Full LBlock / Liang Zhao, Takashi Nishide and Kouichi Sakurai -- Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator / Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer and François Poucheret, et al. -- A Closer Look at Security in Random Number Generators Design / Viktor Fischer -- Same Values Power Analysis Using Special Points on Elliptic Curves / Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst and David Naccache -- The Schindler-Itoh-attack in Case of Partial Information Leakage / Alexander Krüger -- Butterfly-Attack on Skein's Modular Addition / Michael Zohner, Michael Kasper and Marc Stöttinger -- MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation / Xinjie Zhao, Fan Zhang, Shize Guo, Tao Wang and Zhijie Shi, et al. -- Intelligent Machine Homicide / Breaking Cryptographic Devices Using Support Vector Machines / Annelie Heuser and Michael Zohner.
Record Nr. NYU-004375032
[COSADE 2012 (2012 : Darmstadt, Germany)]  
Materiale a stampa
Lo trovi qui: New York University
Software process improvement and capability determination : 12th International Conference, SPICE 2012, Palma, Spain, May 29-31, 2012. Proceedings / Antonia Mas [and others] (eds.).
Software process improvement and capability determination : 12th International Conference, SPICE 2012, Palma, Spain, May 29-31, 2012. Proceedings / Antonia Mas [and others] (eds.).
Creatore [SPICE 2012 (2012 : Palma de Mallorca, Spain)]
Estensione 1 online resource.
Disciplina 005.1
Accesso persona Mas, Antonia
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Computer software
Information systems
Management of Computing and Information Systems
Computers and Society
Algorithm Analysis and Problem Complexity
Computer Appl. in Administrative Data Processing
ISBN 9783642304392
3642304397
9783642304385
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Organizational Process Improvement 1 -- Critical Success Factors in Software Process Improvement: A Systematic Review / Sussy Bayona, Jose A. Calvo-Manzano and Tomás San Feliu -- Integrated Process Improvement Approach: Case Studies in Skype Technologies Ltd. / Anneli Tuisk, André Karpištšenko and Marion Lepmets -- A Case Study on Employee Perceptions of Organization Wide Continuous Process Improvement Activities / Algan Uskarcı and Onur Demirörs -- Part 2. SPI in Small and Very Small Enterprises -- Using Composition Trees to Validate an Entry Profile of Software Engineering Lifecycle Profiles for Very Small Entities (VSEs) / Lian Wen and Terry Rout -- Gained Experience by Making Intervention to Improve Software Process in Very Small Organizations / Mohammad Zarour, Jean-Marc Desharnais, Abdulrahman Alarifi, Naji Habra and Grégory Cassiers, et al. -- A Hierarchy of SPI Activities for Software SMEs: Results from ISO/IEC 12207-Based SPI Assessments / Paul Clarke, Rory V. O'Connor and Murat Yilmaz.
Part 3. Process Models 1 -- Innovation, Knowledge- and Technology Transfer Process Capability Model -- innoSPICETM / Jeremy Besson, Tanja Woronowicz, Antanas Mitasiunas and Michael Boronowsky -- A Case Study on Process Composition Using Enterprise SPICE Model / Amalia Alvarez, Santiago Matalonga and Tomás San Feliu -- Extending ISO/IEC 12207 with Software Product Management: A Process Reference Model Proposal / Fritz Stallinger and Robert Neumann -- Part 4. SPI in Automotive Software and Security -- An Experiment on Merging Quality Assessment in Automotive Domain / Morayo Adedjouma, Hubert Dubois, François Terrier and Tarek Kitouni -- A Process-Oriented Approach for Functional Safety Implementation in the Automotive Industry / Maria Antonieta Garcia, Ernesto Viale, Marco Bellotti and João Carlos Alchieri -- Designing a Process Reference Model for Information Security Management Systems / Olivier Mangin, Béatrix Barafort, Patrick Heymans and Eric Dubois.
Part 5. SPI in Medical and Safety Critical Systems -- Barriers to Adopting Agile Practices When Developing Medical Device Software / Martin McHugh, Fergal McCaffery and Valentine Casey -- Development of a Process Assessment Model for Assessing Medical IT Networks against IEC 80001-1 / Silvana Togneri MacMahon, Fergal McCaffery, Sherman Eagles, Frank Keenan and Marion Lepmets, et al. -- Traceability-Why Do It? / Gilbert Regan, Fergal McCaffery, Kevin McDaid and Derek Flood -- Part 6. Organizational Process Improvement 2 -- Improving the Tendering Process through the Deployment of PMBOK® / Antònia Mas and Antoni Lluís Mesquida -- FIRST: Common-Sense Process Scopes for Starting a Process Improvement Program / Luigi Buglione, Fergal McCaffery, Jean Carlo Rossa Hauck and Christiane Gresse von Wangenheim -- A Systematic Approach to the Comparison of Roles in the Software Development Processes / Murat Yilmaz, Rory V. O'Connor and Paul Clarke.
Part 7. Process Models 2 -- Framework for Usage of Multiple Software Process Models / Stasys Peldzius and Saulius Ragaisis -- Self-assessment Model and Review Technique for SPICE: SMART SPICE / Sharmistha Kar, Satyabrata Das, Amiya Kumar Rath and Subrata Kumar Kar -- Bayesian Network Based Bug-fix Effort Prediction Model / Bharathi V., Udaya Shastry and Joseph Raj -- Part 8. Short Papers -- A State of Art of Software Improvement Implementation Support Tools in SMEs / Mirna Muñoz, Antonio De Amescua, Jezreel Mejia, Jose A. Calvo-Manzano and Gonzalo Cuevas, et al. -- Adaptive Process Improvement Approaches / Ravindra Joshi -- Improving Risk Management Practices with Success Driver Analysis / Ernest Wallmüller -- Software Engineering Process and Quality Assurance Framework for Automotive Product Engineering Outsourcing / Manfred Schedl, Eugene Nebrat and Lyudmila Matveeva -- Applying Kaizen for Improving Productivity in Automotive Software Projects / Smitha Bhandary, Balaji Ramachandran and Basavaraj Betageri.
Best Practices for Achieving Automotive SPICE Capability Level 3 / Anna Orecka, Sebastian Dawid and Rafał Dzianach -- Development of the Medi SPICE PRM / Valentine Casey and Fergal McCaffery -- Concrete, Steel and ISO 15288 / Han van Loon -- DEFT -- A Test Framework to Aid Decision Making / Gerry Crines, Sarah Salahuddin and Donald Mackinnon -- Evaluating Management Sentiment towards ISO/IEC 29110 in Very Small Software Development Companies / Rory V. O'Connor -- Using Process Assessment Models Based on Multiple Process Reference Models in a Capability Determination Context / Terry Rout -- Using Target Process Profiles in the Real World / Han van Loon -- Agile Maturity Model: Oxymoron or the Next Level of Understanding / Tomas Schweigert, Risto Nevalainen, Detlef Vohwinkel, Morten Korsaa and Miklos Biro -- The Gamification of SPICE / Alec Dorling and Fergal McCaffery.
Record Nr. NYU-004375469
[SPICE 2012 (2012 : Palma de Mallorca, Spain)]  
Materiale a stampa
Lo trovi qui: New York University
Perspectives on the future of software engineering : essays in honor of Dieter Rombach / Jürgen Münch, Klaus Schmid, editors
Perspectives on the future of software engineering : essays in honor of Dieter Rombach / Jürgen Münch, Klaus Schmid, editors
Estensione 1 online resource (xvi, 366 pages) : illustrations
Disciplina 005.1
Accesso persona Münch, Jürgen, 1968-editor
Schmid, Klaus, editor
Genere/Forma Electronic books
Soggetto non controllato Computer science
Software engineering
Information Systems
Management of Computing and Information Systems
ISBN 9783642373954
364237395X
3642373941
9783642373947
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Empirical Software Engineering Models: Can They Become the Equivalent of Physical Laws in Traditional Engineering? / Dieter Rombach -- Software Development: Notation, Architecture, and Process. Domain Modeling and Domain Engineering: Key Tasks in Requirements Engineering / Manfred Broy -- Towards Agile Verification / Carlo Ghezzi, Amir Molzam Sharifloo, Claudio Menghi -- On Model-Based Software Development / Constance L. Heitmeyer [and others] -- From Software Systems to Complex Software Ecosystems: Model- and Constraint-Based Engineering of Ecosystems / Andreas Rausch [and others] -- A Safety Roadmap to Cyber-Physical Systems / Mario Trapp, Daniel Schneider, Peter Liggesmeyer -- Modeling Complex Information Systems / Joerg Doerr -- Continuous Process Improvement / Jens Heidrich -- Empirical Research and Studies. Paths to Software Engineering Evidence / Ross Jeffery -- An Evidence Profile for Software Engineering Research and Practice / Claes Wohlin -- Challenges of Evaluating the Quality of Software Engineering Experiments / Oscar Dieste, Natalia Juristo -- Technical Debt: Showing the Way for Better Transfer of Empirical Results / Forrest Shull [and others] -- An Empirical Investigation of the Component-Based Performance Prediction Method Palladio / Ralf Reussner, Steffen Becker, Anne Koziolek, Heiko Koziolek -- Can We Trust Software Repositories? / Andreas Zeller -- Empirical Practice in Software Engineering / Andreas Jedlitschka [and others] -- Visions on the Future of Software Engineering as a Discipline. What Is Software? The Role of Empirical Methods in Answering the Question / Leon J. Osterweil -- A Personal Perspective on the Evolution of Empirical Software Engineering / Victor R. Basili -- Moving Toward Evidence-Based Software Production / David M. Weiss, James Kirby Jr., Robyn R. Lutz -- Skating to Where the Puck Is Going: Future Systems and Software Engineering Opportunities and Challenges / Barry Boehm -- Formalism and Intuition in Software Engineering / Michael Jackson-- Education of Software Engineers / Marvin V. Zelkowitz -- Integrated Software Process and Product Lines / Dieter Rombach.
Record Nr. NYU-004402745
Materiale a stampa
Lo trovi qui: New York University
Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers / Pavel Gladyshev, Marcus K. Rogers (eds.).
Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers / Pavel Gladyshev, Marcus K. Rogers (eds.).
Creatore [International Conference on Digital Forensics and Cyber Crime (3rd : 2011 : Dublin, Ireland)]
Estensione 1 online resource (xi, 296 pages) : illustrations.
Disciplina 364.16/8
Accesso persona Gladyshev, Pavel
Rogers, Marcus K.
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer network architectures
Data protection
Systems and Data Security
Management of Computing and Information Systems
Computer System Implementation
ISBN 9783642355158
3642355153
9783642355141
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cybercrime Investigations -- The Role of Perception in Age Estimation / Cynthia A. Murphy -- Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers / Kathryn C. Seigfried-Spellar, Gary R. Bertoline, Marcus K. Rogers -- Law Enforcement 2.0: Regulating the Lawful Interception of Social Media / Esti Peshin -- Mobile Device Forensics -- All Bot Net: A Need for Smartphone P2P Awareness / Kelly A. Cole, Ramindu L. Silva, Richard P. Mislan -- Results of Field Testing Mobile Phone Shielding Devices / Eric Katz, Richard Mislan, Marcus Rogers, Anthony Smith -- Windows Phone 7 from a Digital Forensics' Perspective / Thomas Schaefer, Hans Höfken, Marko Schuba -- An Agent Based Tool for Windows Mobile Forensics / S. Satheesh Kumar, Bibin Thomas, K.L. Thomas -- Forensic Extractions of Data from the Nokia N900 / Mark Lohrum.
New Developments in Digital Forensics -- A Strategy for Testing Metadata Based Deleted File Recovery Tools / James R. Lyle -- Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus / Neil C. Rowe, Simson L. Garfinkel -- A Novel Methodology for Malware Intrusion Attack Path Reconstruction / Ahmed F. Shosha, Joshua I. James, Pavel Gladyshev -- Performance Issues About Context-Triggered Piecewise Hashing / Frank Breitinger, Harald Baier -- Short Papers -- Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment / Sean Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert France -- Yahoo! Messenger Forensics on Windows Vista and Windows 7 / Matthew Levendoski, Tejashree Datar, Marcus Rogers -- Robust Hashing for Efficient Forensic Analysis of Image Sets / Martin Steinebach.
Tracking User Activity on Personal Computers / Anthony Keane, Stephen O'Shaughnessy -- Digital Forensics Techniques -- The Forensic Value of the Windows 7 Jump List / Alexander G. Barnett -- Finding Forensic Information on Creating a Folder in LogFile of NTFS / Gyu-Sang Cho, Marcus K. Rogers -- Rescuing Digital Data from Submerged HDD / Toshinobu Yasuhira, Kazuhiro Nishimura, Tomofumi Koida -- Digital Forensics Education -- Evaluating the Forensic Image Generator Generator / Christian Moch, Felix C. Freiling -- Internet and Network Investigations -- Forensic Extractions of Data from the Nokia N900 / Mark Lohrum -- Formal Methods of Digital Forensics -- A Forensic Framework for Incident Analysis Applied to the Insider Threat / Clive Blackwell -- Reasoning About a Simulated Printer Case Investigation with Forensic Lucid / Serguei A. Mokhov, Joey Paquet, Mourad Debbabi.
Record Nr. NYU-004389298
[International Conference on Digital Forensics and Cyber Crime (3rd : 2011 : Dublin, Ireland)]  
Materiale a stampa
Lo trovi qui: New York University
Foundations of digital government : leading and managing in the digital era / Daniel Veit, Jan Huntgeburth
Foundations of digital government : leading and managing in the digital era / Daniel Veit, Jan Huntgeburth
Creatore [Veit, Daniel, author]
Estensione 1 online resource.
Disciplina 351.0285/4678
Accesso persona Huntgeburth, Jan, author
Genere/Forma Electronic books
Soggetto non controllato Business Information Systems
Public Administration
Computers and Society
Management of Computing and Information Systems
Legal Aspects of Computing
Political Science, general
Economics/Management Science
ISBN 9783642385117
3642385117
3642385109
9783642385100
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction to Digital Government -- 2. Impact of Digital Government -- 3. The Digital Divide -- 4. Legal Aspects of Digital Service Delivery -- 5. Online One-Stop Government -- 6. Open Government -- 7. E-Procurement -- 8. E-Voting -- 9. E-Participation -- 10. Lesson Learned and Outlook.
Record Nr. NYU-004663465
[Veit, Daniel, author]  
Materiale a stampa
Lo trovi qui: New York University
Counterterrorism and cybersecurity : total information awareness / Newton Lee.
Counterterrorism and cybersecurity : total information awareness / Newton Lee.
Creatore [Lee, Newton]
Estensione 1 online resource.
Disciplina 363.325/17
Genere/Forma Electronic books
History
Soggetto non controllato Computer science
Data mining
Multimedia systems
Information Systems
Information Systems Applications (incl. Internet)
Multimedia Information Systems
Management of Computing and Information Systems
ISBN 9781461472056
1461472059
1461472040
9781461472049
1489986731
9781489986733
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Counterterrorism in Retrospect: Then and Now. September 11 Attacks -- U.S. Intelligence Community -- Counterterrorism Technologies: Total Information Awareness and Data Mining. The Rise and Fall of Total Information Awareness -- The Afterlife of Total Information Awareness -- Artificial Intelligence and Data Mining -- Counterterrorism Technologies: Social Media and Cybersecurity. Social Media and Two-Way Street of Total Information Awareness -- Cyber Warfare: Weapon of Mass Disruption -- Cyber Attacks, Prevention, and Countermeasures -- Plan X and Generation Z -- Counterterrorism Strategies: Causes and Cures, War and Peace. Understanding Terrorism -- Cures for Terrorism -- War and Peace.
Record Nr. NYU-004637034
[Lee, Newton]  
Materiale a stampa
Lo trovi qui: New York University
Formal aspects of security and trust : 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised selected papers / Gilles Barthe, Anupam Datta, Sandro Etalle (eds.).
Formal aspects of security and trust : 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised selected papers / Gilles Barthe, Anupam Datta, Sandro Etalle (eds.).
Creatore [FAST (Workshop) (8th : 2011 : Leuven, Belgium)]
Estensione 1 online resource (x, 277 pages) : illustrations.
Disciplina 005.8
Accesso persona Barthe, Gilles, 1967-
Datta, Anupam
Etalle, Sandro
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Information storage and retrieval systems
Information Systems
Systems and Data Security
Computers and Society
Management of Computing and Information Systems
Information Storage and Retrieval
ISBN 9783642294204
3642294200
9783642294198
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Verifying Cryptographic Code in C: Some Experience and the Csec Challenge / Mihhail Aizatulin, François Dupressoir, Andrew D. Gordon and Jan Jürjens -- Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation / Willem De Groef, Dominique Devriese and Frank Piessens -- Differential Privacy: On the Trade-Off between Utility and Information Leakage / Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano and Catuscia Palamidessi -- On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information Flow / Luciano Bello and Eduardo Bonelli -- Min-Entropy Leakage of Channels in Cascade / Barbara Espinoza and Geoffrey Smith -- Secure Recharge of Disposable RFID Tickets / Riccardo Focardi and Flaminia L. Luccio -- Avoiding Delegation Subterfuge Using Linked Local Permission Names / Simon N. Foley and Samane Abdi -- Verifiable Control Flow Policies for Java Bytecode / Arnaud Fontaine, Samuel Hym and Isabelle Simplot-Ryl -- Concepts and Proofs for Configuring PKCS#11 / Sibylle Fröschle and Nils Sommer -- Service Automata / Richard Gay, Heiko Mantel and Barbara Sprick -- Analysing Applications Layered on Unilaterally Authenticating Protocols / Thomas Gibson-Robinson and Gavin Lowe -- Type-Based Enforcement of Secure Programming Guidelines -- Code Injection Prevention at SAP / Robert Grabowski, Martin Hofmann and Keqin Li -- TBA : A Hybrid of Logic and Extensional Access Control Systems / Timothy L. Hinrichs, William C. Garrison III, Adam J. Lee, Skip Saunders and John C. Mitchell -- Diffie-Hellman without Difficulty / Sebastian Mödersheim -- Is Cryptyc Able to Detect Insider Attacks? / Behnam Sattarzadeh and Mehran S. Fallah -- Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes / Ben Smyth, Mark Ryan and Liqun Chen -- Risk Balance in Optimistic Non-repudiation Protocols / Mohammad Torabi Dashti, Jan Cederquist and Yanjing Wang.
Record Nr. NYU-004375844
[FAST (Workshop) (8th : 2011 : Leuven, Belgium)]  
Materiale a stampa
Lo trovi qui: New York University
Formal methods for model-driven engineering : 12th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2012, Bertinoro, Italy, June 18-23, 2012. Advanced lectures / Marco Bernardo, Vittorio Cortellessa, Alfonso Pierantonio (eds.).
Formal methods for model-driven engineering : 12th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2012, Bertinoro, Italy, June 18-23, 2012. Advanced lectures / Marco Bernardo, Vittorio Cortellessa, Alfonso Pierantonio (eds.).
Creatore [International School on Formal Methods for the Design of Computer, Communication, and Software Systems (12th : 2012 : Bertinoro, Italy)]
Estensione 1 online resource (vii, 437 pages) : illustrations.
Disciplina 004.01/51
Accesso persona Bernardo, Marco
Cortellessa, Vittorio
Pierantonio, Alfonso
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Software engineering
Information Systems
Software Engineering/Programming and Operating Systems
Mathematical Logic and Formal Languages
Programming Languages, Compilers, Interpreters
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
ISBN 9783642309823
3642309828
9783642309816
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Less Well Known UML: A Short User Guide / Bran Selic -- MDE Basics with a DSL Focus / Suzana Andova, Mark G.J. van den Brand, Luc J.P. Engelen and Tom Verhoeff -- Object Constraint Language (OCL): A Definitive Guide / Jordi Cabot and Martin Gogolla -- Model Transformations / Davide Di Ruscio, Romina Eramo and Alfonso Pierantonio -- Graph Transformations for MDE, Adaptation, and Models at Runtime / Holger Giese, Leen Lambers, Basil Becker, Stephan Hildebrandt and Stefan Neumann, et al. -- Abstractions for Validation in Action / Guido de Caso, Victor Braberman, Diego Garbervetsky and Sebastian Uchitel -- Software Performance Modeling / Dorina C. Petriu, Mohammad Alhaj and Rasha Tawhid -- Model Transformations in Non-functional Analysis / Steffen Becker -- Software Performance Antipatterns: Modeling and Analysis / Vittorio Cortellessa, Antinisca Di Marco and Catia Trubiani -- An Introduction to Model Versioning / Petra Brosch, Gerti Kappel, Philip Langer, Martina Seidl and Konrad Wieland, et al. -- Formal Specification and Testing of Model Transformations / Antonio Vallecillo, Martin Gogolla, Loli Burgueño, Manuel Wimmer and Lars Hamann.
Record Nr. NYU-004375860
[International School on Formal Methods for the Design of Computer, Communication, and Software Systems (12th : 2012 : Bertinoro, Italy)]  
Materiale a stampa
Lo trovi qui: New York University