Seems you have not registered as a member of brazil123.net!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

International Journal of Secure Software Engineering (IJSSE) Volume 8
  • Language: en
  • Pages: 85
Cloud Computing
  • Language: en
  • Pages: 707

Cloud Computing

This book constitutes the reviewed proceedings of the first International Conference on Cloud Computing, CloudCom 2009, held in Beijing, China, December 1-4, 2009. The 42 full papers presented together with four invited papers were carefully selected from 200 submissions. This book includes but are not limited to deal with topics like cloud /grid architecture, load balancing, optimal deploy configuration, consistency models, virtualization technologies, middleware frameworks, software as a Service (SaaS), hardware as a Service (HaaS), data grid & semantic web, web services, security and Risk, fault tolerance and reliability, auditing, monitoring and scheduling, utility computing, high-performance computing and peer to peer computing.

Empirical Research for Software Security
  • Language: en
  • Pages: 302

Empirical Research for Software Security

  • Type: Book
  • -
  • Published: 2017-11-28
  • -
  • Publisher: CRC Press

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.

Autonomic and Trusted Computing
  • Language: en
  • Pages: 666

Autonomic and Trusted Computing

  • Type: Book
  • -
  • Published: 2008-06-20
  • -
  • Publisher: Springer

This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC 2008, held in Oslo, Norway, in June 2008, co-located with UIC 2008, the 5th International Conference on Ubiquitous Intelligence and Computing. The 25 revised full papers presented together with 26 special session papers and 1 keynote talk were carefully reviewed and selected from 75 submissions. The regular papers are organized in topical sections on intrusion detection, trust, trusted systems and crypto, autonomic computing, organic computing, knowledge and patterns, and pervasive systems. The special session papers cover issues such as organic computing, trust, trust and dependable systems, routing and reliable systems, sensor networks, VoIP, and watermarking.

Privacy and Identity Management for Emerging Services and Technologies
  • Language: en
  • Pages: 249

Privacy and Identity Management for Emerging Services and Technologies

  • Type: Book
  • -
  • Published: 2014-05-02
  • -
  • Publisher: Springer

This book contains a range of keynote papers and submitted papers presented at the 7th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, held in Nijmegen, The Netherlands, in June 2013. The 13 revised full papers and 6 keynote papers included in this volume were carefully selected from a total of 30 presentations and 11 keynote talks and were subject to a two-step review process. The keynote papers cover the dramatic global changes, including legislative developments that society is facing today. Privacy and identity management are explored in specific settings, such as the corporate context, civic society, and education and using particular technologies such as cloud computing. The regular papers examine the challenges to privacy, security and identity; ways of preserving privacy; identity and identity management and the particular challenges presented by social media.

Security and privacy in dynamic environments
  • Language: en
  • Pages: 494

Security and privacy in dynamic environments

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Security, Arms Control, and Conflict Reduction in East Asia and the Pacific
  • Language: en
  • Pages: 551

Security, Arms Control, and Conflict Reduction in East Asia and the Pacific

  • Type: Book
  • -
  • Published: 1993
  • -
  • Publisher: Greenwood

The most comprehensive bibliography to date on the myriad aspects of peace and security issues in East Asia and the Pacific.

Betriebswirtschaftliche Aspekte bei der Einführung von Cloud Computing
  • Language: de
  • Pages: 120

Betriebswirtschaftliche Aspekte bei der Einführung von Cloud Computing

  • Type: Book
  • -
  • Published: 2011
  • -
  • Publisher: GRIN Verlag

Diplomarbeit aus dem Jahr 2011 im Fachbereich Informatik - Wirtschaftsinformatik, Note: 1,0, DIPLOMA Private Hochschulgesellschaft mbH, Sprache: Deutsch, Abstract: Kein anderes Thema der Informationstechnik weckt derzeit so grosse Erwartungen wie Cloud Computing. Kostensenkungen, keine fixen Kosten, Flexibilitat und Konzentration auf die Kernkompetenz eines Unternehmens sind haufige Argumente, die als Vorteile der Cloud vorgetragen werden. Da uberrascht es nicht, dass Anbieter die Entscheidung uber die Frage des Fremdbezugs von Cloud-Diensten gerne auf einen einfachen Kostenvergleich reduzieren. Aber dies ist eindeutig zu kurz gedacht, da bei der Entscheidung uber Eigen- oder Fremdbetrieb vo...

Studentene fra 1928
  • Language: no
  • Pages: 391

Studentene fra 1928

  • Type: Book
  • -
  • Published: 1953
  • -
  • Publisher: Unknown

None