|
|
Click the serial number on the left to view the details of the item. |
# |
Author | Title | Accn# | Year | Item Type | Claims |
1 |
Masys, Anthony J |
Exploring the Security Landscape: Non-Traditional Security Challenges |
I10203 |
2016 |
eBook |
|
2 |
Xu, Yang |
Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems |
I09090 |
2020 |
eBook |
|
3 |
Young, Carl S |
Risk and the Theory of Security Risk Assessment |
I08998 |
2019 |
eBook |
|
4 |
Arnon-Friedman, Rotem |
Device-Independent Quantum Information Processing |
I08928 |
2020 |
eBook |
|
5 |
Malizia, Andrea |
Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference |
I08562 |
2018 |
eBook |
|
6 |
Anirban Chakrabarti |
Grid computing security |
023836 |
2010 |
Book |
|
7 |
LEHTINEN, RICK |
Computer security basics |
021362 |
2006 |
Book |
|
8 |
OSBORNE, MARK |
How to cheat at managing information security |
021364 |
2006 |
Book |
|
9 |
LOEPP, SUSAN |
Protecting information: From classical error correction to quantum crytography |
021064 |
2006 |
Book |
|
10 |
PFLEEGER, CHARLES P. |
Security in computing : 3rd Edition |
020026 |
2003 |
Book |
|
|
1.
|
|
Title | Exploring the Security Landscape: Non-Traditional Security Challenges |
Author(s) | Masys, Anthony J |
Publication | Cham, Springer International Publishing, 2016. |
Description | VI, 325 p. 45 illus., 29 illus. in color : online resource |
Abstract Note | This book provides international perspective for those studying or working in the security domain, from enforcement to policy. It focuses on non-traditional threats in a landscape that has been described as transnational in nature and incorporates natural disasters, gang violence, extremism and terrorism, amongst other issues. Chapters provide innovative thinking on themes including cyber security, maritime security, transnational crime, human security, globalization and economic security. Relevant theoretical frameworks are presented and readers are expertly guided through complex threats, from matters pertaining to health security which pose threats not only to humans but also have significant national security implications, to issues regarding critical infrastructure vulnerability and the complexity of understanding terrorist operations. Authors reveal how emerging uncertainties regarding global critical infrastructure and supply chain security, food security, and health security are linked to the notion of human security. Security professionals, policy makers and academics will all gain from the insights, strategies and perspectives in this book. It builds understanding of the deepening and broadening domain of security studies and provides a valuable reference text for courses on security studies and international relations |
ISBN,Price | 9783319279145 |
Keyword(s) | 1. Applications of Graph Theory and Complex Networks
2. COMPUTER SECURITY
3. EBOOK
4. EBOOK - SPRINGER
5. Energy and state
6. Energy policy
7. Energy Policy, Economics and Management
8. Health promotion
9. Health Promotion and Disease Prevention
10. NATURAL DISASTERS
11. NATURAL HAZARDS
12. PHYSICS
13. Security Science and Technology
14. System safety
15. Systems and Data Security
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I10203 |
|
|
On Shelf |
|
|
|
|
2.
|
|
Title | Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems : The Fourth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP) |
Author(s) | Xu, Yang;Sun, Yongbin;Liu, Yanyang;Wang, Yanjun;Gu, Pengfei;Liu, Zheming |
Publication | Singapore, Springer Singapore, 2020. |
Description | XIII, 571 p. 306 illus., 154 illus. in color : online resource |
Abstract Note | This book presents a compilation of selected papers from the Fourth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in August 2019 in Guiyang, China. The purpose of the symposium was to discuss inspection, testing, certification and research concerning the software and hardware of instrument and control (I&C) systems used at nuclear power plants (NPP), such as sensors, actuators and control systems. The event provides a venue for exchange among experts, scholars and nuclear power practitioners, as well as a platform for the combination of teaching and research at universities and enterprises to promote the safe development of nuclear power plants. Readers will find a wealth of valuable insights into achieving safer and more efficient instrumentation and control systems |
ISBN,Price | 9789811518768 |
Keyword(s) | 1. COMPUTER SECURITY
2. EBOOK
3. EBOOK - SPRINGER
4. Effects of Radiation/Radiation Protection
5. Industrial safety
6. Measurement Science and Instrumentation
7. Measurement??????
8. NUCLEAR ENERGY
9. PHYSICAL MEASUREMENTS
10. QUALITY CONTROL
11. Quality Control, Reliability, Safety and Risk
12. Radiation protection
13. Radiation???Safety measures
14. RELIABILITY
15. Systems and Data Security
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I09090 |
|
|
On Shelf |
|
|
|
|
3.
|
|
Title | Risk and the Theory of Security Risk Assessment |
Author(s) | Young, Carl S |
Publication | Cham, Springer International Publishing, 2019. |
Description | XXIII, 274 p. 81 illus : online resource |
Abstract Note | This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security risk assessment methodology. Furthermore, the book identifies and explores concepts with profound operational implications that have traditionally been sources of ambiguity if not confusion in security risk management. Notably, the text provides a simple quantitative model for complexity, a significant driver of risk that is typically not addressed in security-related contexts. Risk and The Theory of Security Risk Assessment is a primer of security risk assessment pedagogy, but it also provides methods and metrics to actually estimate the magnitude of security risk. Concepts are explained using numerous examples, which are at times both enlightening and entertaining. As a result, the book bridges a longstanding gap between theory and practice, and therefore will be a useful reference to students, academics and security practitioners. |
ISBN,Price | 9783030306007 |
Keyword(s) | 1. COMPLEX SYSTEMS
2. COMPUTER SECURITY
3. EBOOK
4. EBOOK - SPRINGER
5. Risk management
6. Security Science and Technology
7. Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences
8. Statistics??
9. System safety
10. SYSTEM THEORY
11. Systems and Data Security
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I08998 |
|
|
On Shelf |
|
|
|
|
4.
|
|
Title | Device-Independent Quantum Information Processing : A Simplified Analysis |
Author(s) | Arnon-Friedman, Rotem |
Publication | Cham, Springer International Publishing, 2020. |
Description | XVI, 217 p. 13 illus., 6 illus. in color : online resource |
Abstract Note | Device-independent quantum cryptography is a method for exchanging secret messages over potentially insecure quantum communication channels, such as optical fibers. In contrast to conventional quantum cryptography, security is guaranteed even if the devices used by the communication partners, such as photon sources and detectors, deviate from their theoretical specifications. This is of high practical relevance, for attacks to current implementations of quantum cryptography exploit exactly such deviations. Device-independent cryptography is however technologically so demanding that it looked as if experimental realizations are out of reach. In her thesis, Rotem Arnon-Friedman presents powerful information-theoretic methods to prove the security of device-independent quantum cryptography. Based on them, she is able to establish security in a parameter regime that may be experimentally achievable in the near future. Rotem Arnon-Friedman's thesis thus provides the theoretical foundations for an experimental demonstration of device-independent quantum cryptography. |
ISBN,Price | 9783030602314 |
Keyword(s) | 1. COMPUTER SECURITY
2. EBOOK
3. EBOOK - SPRINGER
4. QUANTUM COMPUTERS
5. Quantum computing
6. QUANTUM PHYSICS
7. Systems and Data Security
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I08928 |
|
|
On Shelf |
|
|
|
|
5.
|
|
Title | Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference : Science as the first countermeasure for CBRNE and Cyber threats |
Author(s) | Malizia, Andrea;D'Arienzo, Marco |
Publication | Cham, Springer International Publishing, 2018. |
Description | XII, 458 p. 160 illus., 140 illus. in color : online resource |
Abstract Note | This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE |
ISBN,Price | 9783319917917 |
Keyword(s) | 1. CHEMISTRY
2. COMPUTER SECURITY
3. Data protection
4. EBOOK
5. EBOOK - SPRINGER
6. Effects of Radiation/Radiation Protection
7. Radiation protection
8. Radiation???Safety measures
9. Safety in Chemistry, Dangerous Goods
10. Security
11. Security Science and Technology
12. System safety
13. Systems and Data Security
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I08562 |
|
|
On Shelf |
|
|
|
| |