Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, "computing" refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ''information society'', we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ''global information infrastructure'' on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, "computing" refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ''information society'', we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ''global information infrastructure'' on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.
This book constitutes the refereed proceedings of the 12th European Symposium on Research in Computer Security, ESORICS 2007, held in Dresden, Germany in September 2007. The 39 revised full papers presented were carefully reviewed and selected from 164 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.
The papers in this volume were presented at the International Conference on Database Theory, held in Berlin, Germany, October 14-16, 1992. This conference initiated the merger of two series of conferences on theoretical aspects of databases that were formed in parallel by different scientific communities in Europe. The first series was known as the International Conference on Database Theory and the second as the Symposium on Mathematical Fundamentals of Database Systems. In the future, ICDT will be organized every two years, alternating with the more practically oriented series of conferences on Extending Database Technology (EDBT). The volume contains 3 invited lectures and 26 contributed papers selected from a total of 107 submissions. The papers are organized into sections on constraints and decomposition, query languages, updates and active databases, concurrency control and recovery, knowledge bases, datalog complexity and optimization, object orientation, information capacity and security, and data structures and algorithms. Two of the invited papers survey research into theoretical database issues done in Eastern Europe during the past decade.
This volume contains the 13 best of the 18 papers presented at the first MFDBS conference held in Dresden, GDR, January 19-23, 1987. A short summary of the two panel discussions is also included. The volume is intended to be a reflection of the current state of knowledge and a guide to further development in database theory. The main topics covered are: theoretical fundaments of the relational data model (dependency theory, design theory, null values, query processing, complexity theory), and of its extensions (graphical representations, NF2-models), conceptual modelling of distributed database management systems and the relationship between logic and databases.
Dieses Buch behandelt die Grundlagen von Informationssystemen, die als Hilfsmittel verstanden werden. Ausgehend von Einfuhrungen in die semantische Modellierung und die mathematische Logik werden ein logikorientiertes, das relationale und objektorientierte Datenmodell vorgestellt. Fur die schichtenmassige Architektur werden insbesondere die Ubersetzungen von machtigen, benutzernahen Konstrukten in rechnernahe Konzepte betrachtet. Transaktionen werden vorrangig unter dem Gesichtspunkt der Serialisierbarkeit untersucht. Die wichtigen Fragestellungen der Optimierung logikorientierter und relationaler Anfragen sowie der Theorie des Entwurfs von Datenbankschemen werden vertiefend dargestellt. Dieses Buch wendet sich an alle an Grundlagen interessierte Studenten, Wissenschaftler und Entwickler, die Informationssysteme benutzen oder selbst entwerfen wollen."
|
You may like...
Rogue One: A Star Wars Story - Blu-Ray…
Felicity Jones, Diego Luna, …
Blu-ray disc
R382
Discovery Miles 3 820
|