0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (11)
  • -
Status
Brand

Showing 1 - 12 of 12 matches in All Departments

Recoverability as a First-Class Security Objective - Proceedings of a Workshop (Paperback): National Academies of Sciences,... Recoverability as a First-Class Security Objective - Proceedings of a Workshop (Paperback)
National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Cyber Resilience Workshop Series; Edited by Lynette I. Millett, …
R1,063 Discovery Miles 10 630 Ships in 12 - 17 working days

The Forum on Cyber Resilience of the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Recoverability as a First-Class Security Objective on February 8, 2018, in Washington, D.C. The workshop featured presentations from several experts in industry, research, and government roles who spoke about the complex facets of recoverability?that is, the ability to restore normal operations and security in a system affected by software or hardware failure or a deliberate attack. This publication summarizes the presentations and discussions from the workshop. Table of Contents Front Matter 1 Introduction and Framing 2 Summary of Workshop Presentations 3 Closing Observations and Discussion Appendixes Appendix A: Workshop Agenda and Participants List Appendix B: Steering Committee Biographies Appendix C: Speaker Biographies

Who Goes There? - Authentication Through the Lens of Privacy (Paperback, New): National Research Council, Division on... Who Goes There? - Authentication Through the Lens of Privacy (Paperback, New)
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Authentication Technologies and Their Privacy Implications; Edited by Lynette I. Millett, …
R1,284 Discovery Miles 12 840 Ships in 12 - 17 working days

Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more ubiquitous, understanding its interplay with privacy is vital. The report examines numerous concepts, including authentication, authorization, identification, privacy, and security. It provides a framework to guide thinking about these issues when deciding whether and how to use authentication in a particular context. The book explains how privacy is affected by system design decisions. It also describes government's unique role in authentication and what this means for how government can use authentication with minimal invasions of privacy. In addition, Who Goes There? outlines usability and security considerations and provides a primer on privacy law and policy. Table of Contents Front Matter Executive Summary 1 Introduction and Overview 2 Authentication in the Abstract 3 Privacy Challenges in Authentication Systems 4 Security and Usability 5 Authentication Technologies 6 Authentication, Privacy, and the Roles of Government 7 A Toolkit for Privacy in the Context of Authentication Appendix A: Biographies of Committee Members and Staff Appendix B: Briefers to the Study Committee Appendix C: Some Key Concepts What is CSTB?

The Future of Computing Performance - Game Over or Next Level? (Paperback): National Research Council, Division on Engineering... The Future of Computing Performance - Game Over or Next Level? (Paperback)
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Sustaining Growth in Computing Performance; Edited by Lynette I. Millett, …
R1,231 Discovery Miles 12 310 Ships in 12 - 17 working days

The end of dramatic exponential growth in single-processor performance marks the end of the dominance of the single microprocessor in computing. The era of sequential computing must give way to a new era in which parallelism is at the forefront. Although important scientific and engineering challenges lie ahead, this is an opportune time for innovation in programming systems and computing architectures. We have already begun to see diversity in computer designs to optimize for such considerations as power and throughput. The next generation of discoveries is likely to require advances at both the hardware and software levels of computing systems. There is no guarantee that we can make parallel computing as common and easy to use as yesterday's sequential single-processor computer systems, but unless we aggressively pursue efforts suggested by the recommendations in this book, it will be "game over" for growth in computing performance. If parallel programming and related software efforts fail to become widespread, the development of exciting new applications that drive the computer industry will stall; if such innovation stalls, many other parts of the economy will follow suit. The Future of Computing Performance describes the factors that have led to the future limitations on growth for single processors that are based on complementary metal oxide semiconductor (CMOS) technology. It explores challenges inherent in parallel computing and architecture, including ever-increasing power consumption and the escalated requirements for heat dissipation. The book delineates a research, practice, and education agenda to help overcome these challenges. The Future of Computing Performance will guide researchers, manufacturers, and information technology professionals in the right direction for sustainable growth in computer performance, so that we may all enjoy the next level of benefits to society. Table of Contents Front Matter Abstract Summary 1 The Need for Continued Performance Growth 2 What Is Computer Performance? 3 Power Is Now Limiting Growth in Computing Performance 4 The End of Programming as We Know It 5 Research, Practice, and Education to Meet Tomorrow's Performance Needs Appendixes Appendix A: A History of Computer Performance Appendix B: Biographies of Committee Members and Staff Appendix C: Reprint of Gordon E. Moore's "Cramming More Components onto Integrated Circuits" Appendix D: Reprint of Robert H. Dennard's "Design of Ion-Implanted MOSFET's with Very Small Physical Dimensions"

Biometric Recognition - Challenges and Opportunities (Paperback): National Research Council, Division on Engineering and... Biometric Recognition - Challenges and Opportunities (Paperback)
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Whither Biometrics Committee; Edited by Lynette I. Millett, …
R1,198 Discovery Miles 11 980 Ships in 12 - 17 working days

Biometric recognition-the automated recognition of individuals based on their behavioral and biological characteristic-is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric recognition has been applied to identification of criminals, patient tracking in medical informatics, and the personalization of social services, among other things. In spite of substantial effort, however, there remain unresolved questions about the effectiveness and management of systems for biometric recognition, as well as the appropriateness and societal impact of their use. Moreover, the general public has been exposed to biometrics largely as high-technology gadgets in spy thrillers or as fear-instilling instruments of state or corporate surveillance in speculative fiction. Now, as biometric technologies appear poised for broader use, increased concerns about national security and the tracking of individuals as they cross borders have caused passports, visas, and border-crossing records to be linked to biometric data. A focus on fighting insurgencies and terrorism has led to the military deployment of biometric tools to enable recognition of individuals as friend or foe. Commercially, finger-imaging sensors, whose cost and physical size have been reduced, now appear on many laptop personal computers, handheld devices, mobile phones, and other consumer devices. Biometric Recognition: Challenges and Opportunities addresses the issues surrounding broader implementation of this technology, making two main points: first, biometric recognition systems are incredibly complex, and need to be addressed as such. Second, biometric recognition is an inherently probabilistic endeavor. Consequently, even when the technology and the system in which it is embedded are behaving as designed, there is inevitable uncertainty and risk of error. This book elaborates on these themes in detail to provide policy makers, developers, and researchers a comprehensive assessment of biometric recognition that examines current capabilities, future possibilities, and the role of government in technology and system development. Table of Contents Front Matter Summary 1 Introduction and Fundamental Concepts 2 Engineering Biometric Systems 3 Lessons from Other Large-Scale Systems 4 Cultural, Social, and Legal Considerations 5 Research Opportunities and the Future of Biometrics Appendixes Appendix A: Biosketches of Committee Members and Staff Appendix B: Watch-List Operational Performance and List Size: A First-Cut Analysis Appendix C: Statement of Task Appendix D: Testing and Evaluation Examples Appendix E: The Biometrics Standards Landscape

Engaging Privacy and Information Technology in a Digital Age (Hardcover): National Research Council, Division on Engineering... Engaging Privacy and Information Technology in a Digital Age (Hardcover)
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Privacy in the Information Age; Edited by Lynette I. Millett, …
R1,583 Discovery Miles 15 830 Ships in 12 - 17 working days

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable. Table of Contents Front Matter Executive Summary Part I Thinking About Privacy, 1 Thinking About Privacy Part II The Backdrop for Privacy, 2 Intellectual Approaches and Conceptual Underpinnings 3 Technological Drivers 4 The Legal Landscape in the United States 5 The Politics of Privacy Policy in the United States Part III Privacy in Context, 6 Privacy and Organizations 7 Health and Medical Privacy 8 Libraries and Privacy 9 Privacy, Law Enforcement, and National Security Part IV Findings and Recommendations, 10 Findings and Recommendations Appendix A A Short History of Surveillance and Privacy in the United States Appendix B International Perspectives on Privacy Appendix C Biographies Index

Software Update as a Mechanism for Resilience and Security - Proceedings of a Workshop (Paperback): National Academies of... Software Update as a Mechanism for Resilience and Security - Proceedings of a Workshop (Paperback)
National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Forum on Cyber Resilience, Committee on Cyber Resilience Workshop Series; Edited by …
R1,548 Discovery Miles 15 480 Ships in 12 - 17 working days

Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies. To explore the landscape further, the Forum on Cyber Resilience hosted a workshop featuring invited speakers from government, the private sector, and academia. This publication summarizes the presentations and discussions from the workshop. Table of Contents Front Matter Workshop Introduction 1 Policy Considerations: The Intersection of Public Values and Private Infrastructure 2 Technical Considerations for Secure Software Updates 3 Microsoft's Approach to Software Updates 4 Update Issues for Open Source Software 5 Cisco's Approach to Software Updates 6 Ensuring Robust Firmware Updates 7 Updates in the Consumer Electronics Industry 8 Software Updates in Automotive Electronic Control Units 9 The NIST Perspective on Software Updates 10 Protecting Consumers from Software Update Risks 11 Discussion Afterword Appendixes Appendix A: Workshop Agenda and Participants List Appendix B: Steering Committee Biographies Appendix C: Speaker Biographies

Foundational Cybersecurity Research - Improving Science, Engineering, and Institutions (Paperback): National Academies of... Foundational Cybersecurity Research - Improving Science, Engineering, and Institutions (Paperback)
National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board; Edited by Peter J. Weinberger, Baruch Fischhoff, …
R1,243 Discovery Miles 12 430 Ships in 12 - 17 working days

Attaining meaningful cybersecurity presents a broad societal challenge. Its complexity and the range of systems and sectors in which it is needed mean that successful approaches are necessarily multifaceted. Moreover, cybersecurity is a dynamic process involving human attackers who continue to adapt. Despite considerable investments of resources and intellect, cybersecurity continues to poses serious challenges to national security, business performance, and public well-being. Modern developments in computation, storage and connectivity to the Internet have brought into even sharper focus the need for a better understanding of the overall security of the systems we depend on. Foundational Cybersecurity Research focuses on foundational research strategies for organizing people, technologies, and governance. These strategies seek to ensure the sustained support needed to create an agile, effective research community, with collaborative links across disciplines and between research and practice. This report is aimed primarily at the cybersecurity research community, but takes a broad view that efforts to improve foundational cybersecurity research will need to include many disciplines working together to achieve common goals. Table of Contents Front Matter Summary 1 Cybersecurity Challenges and Security Science 2 The Role of Social, Behavioral, and Decision Sciences in Security Science 3 Engineering, Operational, and Life-Cycle Challenges in Security Science 4 Foundational Research Topics 5 Institutional Opportunities to Improve Security Science Appendixes Appendix A: Briefers to the Study Committee Appendix B: Committee Biographies Appendix C: Highlights from Other Research Agendas

A Review of the Next Generation Air Transportation System - Implications and Importance of System Architecture (Paperback):... A Review of the Next Generation Air Transportation System - Implications and Importance of System Architecture (Paperback)
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee to Review the Enterprise Architecture, Software Development Approach, and Safety and Human Factor Design of the Next Generation Air Transportation System; Edited by Lynette I. Millett, …
R1,122 Discovery Miles 11 220 Ships in 12 - 17 working days

The Next Generation Air Transportation System's (NextGen) goal is the transformation of the U.S. national airspace system through programs and initiatives that could make it possible to shorten routes, navigate better around weather, save time and fuel, reduce delays, and improve capabilities for monitoring and managing of aircraft. A Review of the Next Generation Air Transportation provides an overview of NextGen and examines the technical activities, including human-system design and testing, organizational design, and other safety and human factor aspects of the system, that will be necessary to successfully transition current and planned modernization programs to the future system. This report assesses technical, cost, and schedule risk for the software development that will be necessary to achieve the expected benefits from a highly automated air traffic management system and the implications for ongoing modernization projects. The recommendations of this report will help the Federal Aviation Administration anticipate and respond to the challenges of implementing NextGen. Table of Contents Front Matter Summary 1 Recognize Constraints and Align Expectations 2 Assert Architectural Leadership 3 Cope with Change 4 Minimize Cultural and Organizational Barriers Appendixes Appendix A: Biographies of CommitteeMembers and Staff Appendix B: Briefers to the Study Committee Appendix C: Acronyms

Computing Research for Sustainability (Paperback): Committee on Computing Research for Environmental and Societal... Computing Research for Sustainability (Paperback)
Committee on Computing Research for Environmental and Societal Sustainability, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council; Edited by Lynette I. Millett, …
R1,280 Discovery Miles 12 800 Ships in 12 - 17 working days

A broad and growing literature describes the deep and multidisciplinary nature of the sustainability challenges faced by the United States and the world. Despite the profound technical challenges involved, sustainability is not, at its root, a technical problem, nor will merely technical solutions be sufficient. Instead, deep economic, political, and cultural adjustments will ultimately be required, along with a major, long-term commitment in each sphere to deploy the requisite technical solutions at scale.
Nevertheless, technological advances and enablers have a clear role in supporting such change, and information technology (IT) is a natural bridge between technical and social solutions because it can offer improved communication and transparency for fostering the necessary economic, political, and cultural adjustments. Moreover, IT is at the heart of nearly every large-scale socioeconomic system-including systems for finance, manufacturing, and the generation and distribution of energy-and so sustainability-focused changes in those systems are inextricably linked with advances in IT.
The focus of Computing Research for Sustainability is "greening through IT," the application of computing to promote sustainability broadly. The aim of this report is twofold: to shine a spotlight on areas where IT innovation and computer science (CS) research can help, and to urge the computing research community to bring its approaches and methodologies to bear on these pressing global challenges. Computing Research for Sustainability focuses on addressing medium- and long-term challenges in a way that would have significant, measurable impact. The findings and recommended principles of the Committee on Computing Research for Environmental and Societal Sustainability concern four areas: (1) the relevance of IT and CS to sustainability; (2) the value of the CS approach to problem solving, particularly as it pertains to sustainability challenges; (3) key CS research areas; and (4) strategy and pragmatic approaches for CS research on sustainability.

Social Security Administration Electronic Service Provision - A Strategic Assessment (Paperback): National Research Council,... Social Security Administration Electronic Service Provision - A Strategic Assessment (Paperback)
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on the Social Security Administration's E-Government Strategy and Planning for the Future; Edited by Joan D Winston, …
R1,429 Discovery Miles 14 290 Ships in 12 - 17 working days

Social Security Administration Electronic Service Provision examines the Social Security Administration's (SSA's) proposed e-government strategy and provides advice on how the SSA can best deliver services to its constituencies in the future. The assessment by the Committee on the Social Security Administration's E-Government Strategy and Planning for the Future was based on (1) its examination of the SSA's current e-government strategy, including technological assumptions, performance measures and targets, planned operational capabilities, strategic requirements, and future goals; (2) its consideration of strategies, assumptions, and technical and operational requirements in comparable public- and private-sector institutions; and (3) its consideration of the larger organizational, societal, and technological context in which the SSA operates. Table of Contents Front Matter Summary 1 Background and Current Context 2 Lessons from Electronic Services in Financial Institutions 3 The Social Security Administration's Information Technology - Present and Future 4 Toward Organizational Transformation for Electronic Service Delivery Appendix A Committee and Staff Biographies Appendix B Panelists and Briefers at Open Committee Meetings Appendix C Social Security Administration Major Office Missions Appendix D Overview of Selected Legislation Pertaining to E-Government Appendix E A Short History of E-Government

IDs - Not That Easy - Questions About Nationwide Identity Systems (Paperback): Committee on Authentication Technologies and... IDs - Not That Easy - Questions About Nationwide Identity Systems (Paperback)
Committee on Authentication Technologies and Their Privacy Implications; Edited by Lynette I. Millett, Stephen T. Kent; National Research Council, Division on Engineering and Physical Sciences, …
R1,243 Discovery Miles 12 430 Ships in 12 - 17 working days

IDs?Not That Easy highlights some of the challenging policy, procedural, and technological issues presented by nationwide identity systems. In the wake of the events of September 11, 2001, nationwide identity systems have been proposed to better track the movement of suspected terrorists. However, questions arise as to who would use the system and how, if participation would be mandatory, the type of data that would be collected, and the legal structures needed to protect privacy. The committee's goal is to foster a broad and deliberate discussion among policy-makers and the public about the form of nationwide identity system that might be created, and whether such a system is desirable or feasible.

Sustainability Considerations for Procurement Tools and Capabilities - Summary of a Workshop (Paperback): National Research... Sustainability Considerations for Procurement Tools and Capabilities - Summary of a Workshop (Paperback)
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Policy and Global Affairs, Science and Technology for Sustainability Program, …
R997 Discovery Miles 9 970 Ships in 12 - 17 working days

Federal laws, regulations, and executive orders have imposed requirements for federal agencies to move toward the sustainable acquisition of goods and services, including the incorporation of sustainable purchasing into federal agency decision making. Since the federal government is such a significant player in the market, its move to incorporate sustainable procurement practices could have a profound impact on the types of products being developed for the market as a whole. The General Services Administration (GSA) has played a key role in furthering sustainable procurement practices throughout the federal government. GSA is responsible for formulating and maintaining government-wide policies covering a variety of administrative actions, including those related to procurement and management. GSA has several ongoing activities related to sustainable procurement to assess the feasibility of working with the federal supplier community - vendors and contractors that serve federal agencies to measure and reduce greenhouse gas emissions in the supply chain while encouraging sustainable operations among suppliers. GSA has also been actively developing programs to assist federal agencies in making sustainable procurement decisions. As federal agencies cannot directly fund the development of sustainable procurement tools, they are particularly interested in understanding how to foster innovation and provide incentives for collaboration between developers and users of tools for sustainable purchasing throughout the supply chain. The training of procurement professionals is also a priority for these agencies. To assist efforts to build sustainability considerations into the procurement process, the National Research Council appointed a committee to organize a two-day workshop that explored ways to better incorporate sustainability considerations into procurement tools and capabilities across the public and private sectors. The workshop was designed to help participants assess the current landscape of green purchasing tools, identify emerging needs for enhanced or new tools and opportunities to develop them, identify potential barriers to progress, and explore potential solutions. The workshop provided an opportunity for participants to discuss challenges related to sustainable purchasing and to developing new procurement tools. Sustainability Considerations for Procurement Tools and Capabilities reviews the presenters' recommendations and tools currently used in sustainable procurement, such as databases for ecolabels and standards, codes, or regulations and other nontechnological tools such as policies, frameworks, rating systems, and product indexes. Table of Contents Front Matter 1 Overview 2 Government Efforts 3 Sourcing and Materials 4 Tools and Technology for Sustainable Purchasing 5 Workforce and Culture Appendix A: Workshop Agenda Appendix B: Registered Participants List Appendix C: Biographies Appendix D: Examples of Federal Agency Procurement Systems and Green Purchasing Programs Appendix E: The Federal Life-Cycle Assessment (LCA) Digital Commons

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Oh My My
OneRepublic CD  (4)
R59 Discovery Miles 590
Multi-Functional Bamboo Standing Laptop…
R595 R299 Discovery Miles 2 990
Too Hard To Forget
Tessa Bailey Paperback R280 R224 Discovery Miles 2 240
A Desire To Return To The Ruins - A Look…
Lucas Ledwaba Paperback R387 R49 Discovery Miles 490
ZA Choker Necklace
R570 R399 Discovery Miles 3 990
Roald Dahl's The Witches
Anne Hathaway, Octavia Spencer, … DVD  (1)
R137 Discovery Miles 1 370
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Space Blankets (Adult)
 (1)
R16 Discovery Miles 160
Sudocrem Skin & Baby Care Barrier Cream…
R128 Discovery Miles 1 280

 

Partners