Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
The Ethics of Cybersecurity
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infras...
Machine Learning for Cyber Physical Systems
This book proceedings presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It contains some selected papers from the international Conference ML4CPS - Machine Learning for Cyber Physical Systems, which was held in Karlsruhe, October 23-24, 2018. Cyber Physical Systems are characterized by their ability to...
Security in Computer and Information Sciences
This book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018.The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software sy...
Cyber-Physical Systems of Systems
Technical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating to achieve a well-defined objective – form the backbone of most of today's infrastructure. The energy grid, most transportation systems, the global banking industry, the water-supply system, the military equipm...
Rational Cybersecurity for Business
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and...
A Journey of Embedded and Cyber-Physical Systems
This open book celebrates Professor Peter Marwedel's outstanding achievements in compilers, embedded systems, and cyber-physical systems. The contributions in the book summarize the content of invited lectures given at the workshop "Embedded Systems" held at the Technical University Dortmund in early July 2019 in honor of Professor M...
Foundations of Multi-Paradigm Modelling for Cyber-Physical Systems
This open book coherently gathers well-founded information on the fundamentals of and formalisms for modelling cyber-physical systems (CPS). Highlighting the cross-disciplinary nature of CPS modelling, it also serves as a bridge for anyone entering CPS from related areas of computer science or engineering.Truly complex, engineered systems - known a...
CyberParks – The Interface Between People, Places and Technology
This book is about public open spaces, about people, and about the relationship between them and the role of technology in this relationship. It is about different approaches, methods, empirical studies, and concerns about a phenomenon that is increasingly being in the centre of sciences and strategies – the penetration of digital technologies in...
Machine Learning for Cyber Physical Systems
This open proceedings presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It contains selected papers from the fifth international Conference ML4CPS - Machine Learning for Cyber Physical Systems, which was held in Berlin, March 12-13, 2020. Cyber Physical Systems are characterized by their ability to ada...
NL ARMS Netherlands Annual Review of Military Studies 2020
This open volume surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together insights from world-leading experts from three continents, the volume identifies the most pressing strategic challenges, frames theoretical concepts, and describes new strategies. The use and utility of deterrence in...
Cyber-Physical Systems: A Model-Based Approach
In this concise yet comprehensive open book, future inventors are introduced to the key concepts of Cyber-Physical Systems (CPS). Using modeling as a way to develop deeper understanding of the computational and physical components of these systems, one can express new designs in a way that facilitates their simulation, visualization, and analysis. ...
Oslo Manual on Select Topics of the Law of Armed Conflict
This open book provides a valuable restatement of the current law of armed conflict regarding hostilities in a diverse range of contexts: outer space, cyber operations, remote and autonomous weapons, undersea systems and devices, submarine cables, civilians participating in unmanned operations, military objectives by nature, civilian airliners, des...
IMPROVE - Innovative Modelling Approaches for Production Systems to Raise Validatable Efficiency
This open access work presents selected results from the European research and innovation project IMPROVE which yielded novel data-based solutions to enhance machine reliability and efficiency in the fields of simulation and optimization, condition monitoring, alarm management, and quality prediction. Prof. Dr. Oliver Niggemann is Professor for Ar...
The Huawei and Snowden Questions
PreliminaryThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of comp...
Impact of Information Society Research in the Global South
The second volume in the SIRCA book series investigates the impact of information society initiatives by extending the boundaries of academic research into the realm of practice. Global in scope, it includes contributions and research projects from Asia, Africa and Latin America. The international scholarly community has taken a variety of approach...
Foundations of Trusted Autonomy
This book establishes the foundations needed to realize the ultimate goals for artificial intelligence, such as autonomy and trustworthiness. Aimed at scientists, researchers, technologists, practitioners, and students, it brings together contributions offering the basics, the challenges and the state-of-the-art on trusted autonomous systems in a s...
Managing the Complexity of Critical Infrastructures
This book summarizes work being pursued in the context of the CIPRNet (Critical Infrastructure Preparedness and Resilience Research Network) research project, co-funded by the European Union under the Seventh Framework Programme (FP7). The project is intended to provide concrete and on-going support to the Critical Infrastructure Protection (CIP) r...
Blockchain and Crypt Currency
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...
Configuring Microsoft SharePoint Hybrid Capabilities
Microsoft SharePoint hybrid consists of a growing list of advanced hybrid solutions that empowers organizations to consume benefits of the cloud and maintain their on-premises investments. This book is the second in a series of SharePoint hybrid books in which we show you how to configure, troubleshoot, and manage a SharePoint hybrid environment. ...
Access Controlled
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...
Introduction to Embedded Systems
An introduction to the engineering principles of embedded systems, with a focus on modeling, design, and analysis of cyber-physical systems. The most visible use of computers and software is processing information for human consumption. The vast majority of computers in use, however, are much less visible. They run the engine, brakes, seatbelts,...
Cyborgs in Latin America
Cyborgs in Latin America explores the ways cultural expression in Latin America has grappled with the changing relationships between technology and human identity. The book takes a literary and cultural studies approach in examining narrative, film and advertising campaigns from Argentina, Bolivia, Chile, Mexico and Uruguay by such artists as Ricar...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
Informatics in the Future
This volume discusses the prospects and evolution of informatics (or computer science), which has become the operating system of our world, and is today seen as the science of the information society. Its artifacts change the world and its methods have an impact on how we think about and perceive the world. Classical computer science is built on th...
Computer Aided Verification
The book set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organ...
eIoT
This book explores the collision between the sustainable energy transition and the Internet of Things (IoT). In that regard, this book's arrival is timely. Not only is the Internet of Things for energy applications, herein called the energy Internet of Things (eIoT), rapidly developing but also the transition towards sustainable energy to abat...
Open and Distance Education in Asia, Africa and the Middle East
This book describes the history, structure and institutions of open and distance education in six countries: China, India, Russia, Turkey, South Africa and South Korea. It describes how open and distance education is evolving in a digital age to reflect the needs and circumstances of the national higher education systems in these countries. It al...
Responsible Innovation
This Open Access book, Responsible innovation provides benefits for society, for instance more sustainable products, more engagement with consumers and less anxiety about emerging technologies. As a governance tool it is mostly driven by research funders, including the European Commission, under the term "responsible research and innovation&qu...
Gaming Rhythms
This book is about digital games, the people who play digital games, and how they play them. This poses a large problem: even when discussing one game, each instance of play is different. Combine this with the thousands of digital games, and the millions of players, and it is apparent that the number of individual instances of game play is unfathom...
Security Infrastructure Technology for Integrated Utilization of Big Data
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especia...
Security in an Interconnected World
This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces can subsequently be determined on the grounds of said analysis. More than ever, internal and external security, and developments both in the Netherlands and abroad are interconnected. The world order is sh...
Guide to Computer Network Security
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...

1 2