![]() |
![]() |
Your cart is empty |
||
Showing 1 - 25 of 64 matches in All Departments
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
In a changing and complex environment currently facing the main challenges of sustainable development, effective management of knowledge, intellectual assets, organizational learning, and talent management are the basis for social innovation and new ways of competition. In this sense, management and business practice are incorporating social and environmental demands made by all types of stakeholders to improve business decisions and strategies. Knowledge Management for Corporate Social Responsibility provides research exploring the theoretical and practical aspects of linking firm profitability, social development, and natural environment in respect to business management practices. Featuring coverage on a broad range of topics such as employer branding, intellectual capital, and organizational performance, this book is ideally designed for business professionals, small business owners, entrepreneurs, academicians, researchers, and business students.
The links between a firm's competitiveness and the natural environment have been studied since the mid 90's. This volume explores, both theoretically and empirically, the relationships between environmental product innovation, green image and firm performance.
Today the capability to create and apply new knowledge represents one of the main sources of sustained competitive advantage. Nevertheless, there are very few empirical studies of this. This book develops an improved and extended theoretical model about knowledge creation and transfer within organizations and tests it empirically with a survey in 115 knowledge-intensive firms. The results show the different knowledge creation processes employed by firms in practice and allow us to obtain evidence-driven models of the various foms of knowledge creation process.
"Focussing on innovation management, this book explores the role of knowledge stocks or intellectual capital blocks (human, social, technological, organizational and regional capitals) on the technological innovation processes typologies (process/product, radical/incremental) and firm performance, absorptive capabilities and organizational learning"--
A veces, la fantasia pare hijos exigentes que reclaman su libertad. La mia, por razones de edad, ha venido a parirme nietos y son estos que bullen intranquilos en papel impreso. Si tienes paciencia, lector amable, veras desfilar ante ti el absurdo de "Roberto," el humor acido de "El concierto," la denuncia en "Relato de mancebia" o la ficcion en "El origen." En cuanto a espacio hallaras de todo: un cuento muy corto de tan solo dos lineas: "Aburrimiento," o un largo relato, a mitad de camino entre el cuento y la novela en "La sobrina del senor cura." Te asomaras tambien a la literatura experimental en "La volubilidad de las ranas," donde he querido plantear la accion y el desenlace a traves del dialogo, eludiendo otros componentes explicativos. Y para que nada falte, como no , me he enfangado en las trilogias. Dos hallaras en estas paginas que, espero, te sean leves. Es cuanto puedo decir. Lo demas lo diran los personajes de cada relato o la lectura, entre lineas, de los abortos de mi imaginacion.
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
This book includes high-quality, peer-reviewed papers from the International Conference on Recent Advancement in Computer, Communication and Computational Sciences (RACCCS-2017), held at Aryabhatta College of Engineering & Research Center, Ajmer, India on September 2-3, 2017, presenting the latest developments and technical solutions in computational sciences. Data science, data- and knowledge engineering require networking and communication as a backbone and have a wide scope of implementation in engineering sciences. Keeping this ideology in mind, the book offers insights that reflect the advances in these fields from upcoming researchers and leading academicians across the globe. Covering a variety of topics, such as intelligent hardware and software design, advanced communications, intelligent computing technologies, advanced software engineering, the web and informatics, and intelligent image processing, it helps those in the computer industry and academia use the advances of next-generation communication and computational technology to shape real-world applications.
Data science, data engineering and knowledge engineering requires networking and communication as a backbone and have wide scope of implementation in engineering sciences. Keeping this ideology in preference, this book includes the insights that reflect the advances in these fields from upcoming researchers and leading academicians across the globe. It contains high-quality peer-reviewed papers of 'International Conference on Recent Advancement in Computer, Communication and Computational Sciences (ICRACCCS 2016)', held at Janardan Rai Nagar Rajasthan Vidyapeeth University, Udaipur, India, during 25-26 November 2016. The volume covers variety of topics such as Advanced Communication Networks, Artificial Intelligence and Evolutionary Algorithms, Advanced Software Engineering and Cloud Computing, Image Processing and Computer Vision, and Security. The book will help the perspective readers from computer industry and academia to derive the advances of next generation communication and computational technology and shape them into real life applications.
This book constitutes the refereed proceedings of the 5th International Symposium on Security in Computing and Communications, SSCC 2017, held in Manipal, India, in September 2017. The 21 revised full papers presented together with 13 short papers were carefully reviewed and selected from 84 submissions. The papers focus on topics such as cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following workshops: Second International Workshop on Security in Self-Organising Networks (Self Net 2014); Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014); Second International Workshop on Trust and Privacy in Cyberspace (Cyber Trust 2014).
The links between a firm's competitiveness and the natural environment have been studied since the mid 90's. This volume explores, both theoretically and empirically, the relationships between environmental product innovation, green image and firm performance.
Focusing on innovation management, the authors explore the role of knowledge stocks or intellectual capital blocks such as human, social, technological, organizational and regional capitals, on technological innovation process typologies and firm performance, absorptive capabilities and organizational learning.
The capability to create and apply new knowledge is one of the main sources of sustained competitive advantage, yet there are few empirical studies of this. This book develops an improved and extended theoretical model about knowledge creation and transfer within organizations, testing it empirically with a survey in 115 knowledge-intensive firms.
This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2022), organized during September 09-11, 2022, in Thailand in online mode. The objective of ICSPN 2022 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community and to provide opportunities to develop creative solutions to various security, privacy and networking problems.
This book constitutes the refereed proceedings of the 7th International Conference on Smart City and Informatization, iSCI 2019, held in Guangzhou, China, in November 2019. The volume presents 52 full papers, which were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on Internet of Things (IoT) and smart sensing; urban computing and big data; smart society informatization technologies; cloud/edge/fog computing for smart city; applications for smart city informatization; assistive engineering and information technology; cyberspace security; blockchain and applications.
This book constitutes the refereed proceedings of the 10th Asia-Pacific Services Computing Conference, APSCC 2016, held in Zhangjiajie, China, in November 2016. The 38 revised full papers presented in this book were carefully reviewed and selected from 107 submissions. The papers cover a wide range of topics in the fields of cloud/utility/Web computing/big data; foundations of services computing; social/peer-to-peer/mobile/ubiquitous/pervasive computing; service-centric computing models; integration of telecommunication SOA and Web services; business process integration and management; and security in services.
This book constitutes the refereed proceedings of the Workshops and Symposiums of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The program of this year consists of 6 symposiums/workshops that cover a wide range of research topics on parallel processing technology: the Sixth International Workshop on Trust, Security and Privacy for Big Data, TrustData 2015; the Fifth International Symposium on Trust, Security and Privacy for Emerging Applications, TSP 2015; the Third International Workshop on Network Optimization and Performance Evaluation, NOPE 2015; the Second International Symposium on Sensor-Cloud Systems, SCS 2015; the Second International Workshop on Security and Privacy Protection in Computer and Network Systems, SPPCN 2015; and the First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys 2015. The aim of these symposiums/workshops is to provide a forum to bring together practitioners and researchers from academia and industry for discussion and presentations on the current research and future directions related to parallel processing technology. The themes and topics of these symposiums/workshops are a valuable complement to the overall scope of ICA3PP 2015 and give additional values and interests.
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers.
In a changing and complex environment currently facing the main challenges of sustainable development, effective management of knowledge, intellectual assets, organizational learning, and talent management are the basis for social innovation and new ways of competition. In this sense, management and business practice are incorporating social and environmental demands made by all types of stakeholders to improve business decisions and strategies. Knowledge Management for Corporate Social Responsibility provides research exploring the theoretical and practical aspects of linking firm profitability, social development, and natural environment in respect to business management practices. Featuring coverage on a broad range of topics such as employer branding, intellectual capital, and organizational performance, this book is ideally designed for business professionals, small business owners, entrepreneurs, academicians, researchers, and business students. |
![]() ![]() You may like...
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, …
Paperback
|