Proceedings of the 2001 USENIX Annual Technical Conference
Author :
Publisher :
Page : 346 pages
File Size : 33,18 MB
Release : 2001
Category : Computer networks
ISBN : 9781880446096
Author :
Publisher :
Page : 346 pages
File Size : 33,18 MB
Release : 2001
Category : Computer networks
ISBN : 9781880446096
Author : USENIX Annual Technical Conference2001, Boston, Mass
Publisher :
Page : pages
File Size : 12,72 MB
Release : 2001
Category :
ISBN : 9781880446096
Author :
Publisher :
Page : 364 pages
File Size : 34,44 MB
Release : 2001
Category : Computer networks
ISBN : 9781880446096
Author :
Publisher :
Page : 308 pages
File Size : 16,72 MB
Release : 2001
Category : Computer software
ISBN : 9781880446102
Author :
Publisher :
Page : 348 pages
File Size : 35,26 MB
Release : 2003
Category : Computer networks
ISBN :
Author :
Publisher :
Page : 458 pages
File Size : 14,73 MB
Release : 2002
Category : Communication
ISBN :
Author : Marshall Kirk McKusick
Publisher : Pearson Education
Page : 926 pages
File Size : 46,39 MB
Release : 2015
Category : Computers
ISBN : 0321968972
This book contains comprehensive, up-to-date, and authoritative technical information on the internal structure of the FreeBSD open-source operating system. Coverage includes the capabilities of the system; how to effectively and efficiently interface to the system; how to maintain, tune, and configure the operating system; and how to extend and enhance the system. The authors provide a concise overview of FreeBSD's design and implementation. Then, while explaining key design decisions, they detail the concepts, data structures, and algorithms used in implementing the systems facilities. As a result, this book can be used as an operating systems textbook, a practical reference, or an in-depth study of a contemporary, portable, open-source operating system. -- Provided by publisher.
Author : Bhavani Thuraisingham
Publisher : CRC Press
Page : 457 pages
File Size : 33,94 MB
Release : 2022-04-27
Category : Computers
ISBN : 1000557502
Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied not only for cyber security but also for every application area—including healthcare, finance, manufacturing, and marketing—could be attacked by malware. Furthermore, due to the power of data science, it is now possible to infer highly private and sensitive information from public data, which could result in the violation of individual privacy. This is the first such book that provides a comprehensive overview of integrating both cyber security and data science and discusses both theory and practice in secure data science. After an overview of security and privacy for big data services as well as cloud computing, this book describes applications of data science for cyber security applications. It also discusses such applications of data science as malware analysis and insider threat detection. Then this book addresses trends in adversarial machine learning and provides solutions to the attacks on the data science techniques. In particular, it discusses some emerging trends in carrying out trustworthy analytics so that the analytics techniques can be secured against malicious attacks. Then it focuses on the privacy threats due to the collection of massive amounts of data and potential solutions. Following a discussion on the integration of services computing, including cloud-based services for secure data science, it looks at applications of secure data science to information sharing and social media. This book is a useful resource for researchers, software developers, educators, and managers who want to understand both the high level concepts and the technical details on the design and implementation of secure data science-based systems. It can also be used as a reference book for a graduate course in secure data science. Furthermore, this book provides numerous references that would be helpful for the reader to get more details about secure data science.
Author : Marvin Zelkowitz
Publisher : Elsevier
Page : 337 pages
File Size : 48,66 MB
Release : 2004-04-30
Category : Computers
ISBN : 0080471897
Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes information security issues and includes topics like certifying computer professionals, non-invasive attacks ("cognitive hacking"), computer files as legal evidence ("computer forensics") and the use of processors on plastic ("smartcards"). The book series is a valuable addition to university courses that emphasize the topics under discussion in that particular volume as well as belonging on the bookshelf of industrial practitioners who need to implement many of the technologies that are described. In-depth surveys and tutorials on new computer technology Well-known authors and researchers in the field Extensive bibliographies with most chapters Five out of seven chapters focus on security issues Discussion of computer forensics, professional certification and smart cards A chapter on how DNA sequencing is accomplished is important in the growing bioinformatics field
Author : Munindar P. Singh
Publisher : CRC Press
Page : 1144 pages
File Size : 14,27 MB
Release : 2004-09-29
Category : Computers
ISBN : 0203507223
The Practical Handbook of Internet Computing analyzes a broad array of technologies and concerns related to the Internet, including corporate intranets. Fresh and insightful articles by recognized experts address the key challenges facing Internet users, designers, integrators, and policymakers. In addition to discussing major applications, it also