SLIM21

Sort Order Display Format Items / Page  
 
  Click the serial number on the left to view the details of the item.
 #  AuthorTitleAccn#YearItem Type Claims
1 Masys, Anthony J Exploring the Security Landscape: Non-Traditional Security Challenges I10203 2016 eBook  
2 Xu, Yang Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems I09090 2020 eBook  
3 Young, Carl S Risk and the Theory of Security Risk Assessment I08998 2019 eBook  
4 Arnon-Friedman, Rotem Device-Independent Quantum Information Processing I08928 2020 eBook  
5 Malizia, Andrea Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference I08562 2018 eBook  
6 Anirban Chakrabarti Grid computing security 023836 2010 Book  
7 LEHTINEN, RICK Computer security basics 021362 2006 Book  
8 OSBORNE, MARK How to cheat at managing information security 021364 2006 Book  
9 LOEPP, SUSAN Protecting information: From classical error correction to quantum crytography 021064 2006 Book  
10 PFLEEGER, CHARLES P. Security in computing : 3rd Edition 020026 2003 Book  
(page:1 / 2) [#12]    Next Page   Last Page 

1.    
No image available
TitleExploring the Security Landscape: Non-Traditional Security Challenges
Author(s)Masys, Anthony J
PublicationCham, Springer International Publishing, 2016.
DescriptionVI, 325 p. 45 illus., 29 illus. in color : online resource
Abstract NoteThis book provides international perspective for those studying or working in the security domain, from enforcement to policy. It focuses on non-traditional threats in a landscape that has been described as transnational in nature and incorporates natural disasters, gang violence, extremism and terrorism, amongst other issues. Chapters provide innovative thinking on themes including cyber security, maritime security, transnational crime, human security, globalization and economic security. Relevant theoretical frameworks are presented and readers are expertly guided through complex threats, from matters pertaining to health security which pose threats not only to humans but also have significant national security implications, to issues regarding critical infrastructure vulnerability and the complexity of understanding terrorist operations. Authors reveal how emerging uncertainties regarding global critical infrastructure and supply chain security, food security, and health security are linked to the notion of human security. Security professionals, policy makers and academics will all gain from the insights, strategies and perspectives in this book. It builds understanding of the deepening and broadening domain of security studies and provides a valuable reference text for courses on security studies and international relations
ISBN,Price9783319279145
Keyword(s)1. Applications of Graph Theory and Complex Networks 2. COMPUTER SECURITY 3. EBOOK 4. EBOOK - SPRINGER 5. Energy and state 6. Energy policy 7. Energy Policy, Economics and Management 8. Health promotion 9. Health Promotion and Disease Prevention 10. NATURAL DISASTERS 11. NATURAL HAZARDS 12. PHYSICS 13. Security Science and Technology 14. System safety 15. Systems and Data Security
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I10203     On Shelf    

2.     
No image available
TitleNuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems : The Fourth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP)
Author(s)Xu, Yang;Sun, Yongbin;Liu, Yanyang;Wang, Yanjun;Gu, Pengfei;Liu, Zheming
PublicationSingapore, Springer Singapore, 2020.
DescriptionXIII, 571 p. 306 illus., 154 illus. in color : online resource
Abstract NoteThis book presents a compilation of selected papers from the Fourth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in August 2019 in Guiyang, China. The purpose of the symposium was to discuss inspection, testing, certification and research concerning the software and hardware of instrument and control (I&C) systems used at nuclear power plants (NPP), such as sensors, actuators and control systems. The event provides a venue for exchange among experts, scholars and nuclear power practitioners, as well as a platform for the combination of teaching and research at universities and enterprises to promote the safe development of nuclear power plants. Readers will find a wealth of valuable insights into achieving safer and more efficient instrumentation and control systems
ISBN,Price9789811518768
Keyword(s)1. COMPUTER SECURITY 2. EBOOK 3. EBOOK - SPRINGER 4. Effects of Radiation/Radiation Protection 5. Industrial safety 6. Measurement Science and Instrumentation 7. Measurement?????? 8. NUCLEAR ENERGY 9. PHYSICAL MEASUREMENTS 10. QUALITY CONTROL 11. Quality Control, Reliability, Safety and Risk 12. Radiation protection 13. Radiation???Safety measures 14. RELIABILITY 15. Systems and Data Security
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I09090     On Shelf    

3.     
No image available
TitleRisk and the Theory of Security Risk Assessment
Author(s)Young, Carl S
PublicationCham, Springer International Publishing, 2019.
DescriptionXXIII, 274 p. 81 illus : online resource
Abstract NoteThis book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security risk assessment methodology. Furthermore, the book identifies and explores concepts with profound operational implications that have traditionally been sources of ambiguity if not confusion in security risk management. Notably, the text provides a simple quantitative model for complexity, a significant driver of risk that is typically not addressed in security-related contexts. Risk and The Theory of Security Risk Assessment is a primer of security risk assessment pedagogy, but it also provides methods and metrics to actually estimate the magnitude of security risk. Concepts are explained using numerous examples, which are at times both enlightening and entertaining. As a result, the book bridges a longstanding gap between theory and practice, and therefore will be a useful reference to students, academics and security practitioners.
ISBN,Price9783030306007
Keyword(s)1. COMPLEX SYSTEMS 2. COMPUTER SECURITY 3. EBOOK 4. EBOOK - SPRINGER 5. Risk management 6. Security Science and Technology 7. Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences 8. Statistics?? 9. System safety 10. SYSTEM THEORY 11. Systems and Data Security
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I08998     On Shelf    

4.     
No image available
TitleDevice-Independent Quantum Information Processing : A Simplified Analysis
Author(s)Arnon-Friedman, Rotem
PublicationCham, Springer International Publishing, 2020.
DescriptionXVI, 217 p. 13 illus., 6 illus. in color : online resource
Abstract NoteDevice-independent quantum cryptography is a method for exchanging secret messages over potentially insecure quantum communication channels, such as optical fibers. In contrast to conventional quantum cryptography, security is guaranteed even if the devices used by the communication partners, such as photon sources and detectors, deviate from their theoretical specifications. This is of high practical relevance, for attacks to current implementations of quantum cryptography exploit exactly such deviations. Device-independent cryptography is however technologically so demanding that it looked as if experimental realizations are out of reach. In her thesis, Rotem Arnon-Friedman presents powerful information-theoretic methods to prove the security of device-independent quantum cryptography. Based on them, she is able to establish security in a parameter regime that may be experimentally achievable in the near future. Rotem Arnon-Friedman's thesis thus provides the theoretical foundations for an experimental demonstration of device-independent quantum cryptography.
ISBN,Price9783030602314
Keyword(s)1. COMPUTER SECURITY 2. EBOOK 3. EBOOK - SPRINGER 4. QUANTUM COMPUTERS 5. Quantum computing 6. QUANTUM PHYSICS 7. Systems and Data Security
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I08928     On Shelf    

5.     
No image available
TitleEnhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference : Science as the first countermeasure for CBRNE and Cyber threats
Author(s)Malizia, Andrea;D'Arienzo, Marco
PublicationCham, Springer International Publishing, 2018.
DescriptionXII, 458 p. 160 illus., 140 illus. in color : online resource
Abstract NoteThis book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE
ISBN,Price9783319917917
Keyword(s)1. CHEMISTRY 2. COMPUTER SECURITY 3. Data protection 4. EBOOK 5. EBOOK - SPRINGER 6. Effects of Radiation/Radiation Protection 7. Radiation protection 8. Radiation???Safety measures 9. Safety in Chemistry, Dangerous Goods 10. Security 11. Security Science and Technology 12. System safety 13. Systems and Data Security
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I08562     On Shelf    

6.     
No image available
TitleGrid computing security
Author(s)Anirban Chakrabarti
PublicationBerlin, Springer, 2010.
Descriptionxiv, 331p.
ISBN,Price9783540444923 : Rs. 495.00(PB)
Classification1. 681.3 2. 681.31
Keyword(s)1. COMPUTER SECURITY 2. GRID COMPUTING
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
023836   681.31/CHA/023836  On Shelf    

+Copy Specific Information
7.     
No image available
TitleComputer security basics
Author(s)Rick Lehtimen;Deborah Russell;G.T. Gangeni Sr.
Edition2nd
PublicationNew Delhi, O'Reilly, 2006.
Description296p.
ISBN,Price8184041586 : Rs. 325.00
Classification681.31
Keyword(s)1. COMMUNICATION SECURITY 2. COMPUTER SECURITY
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
021362   681.31/LEH/021362  On Shelf    

+Copy Specific Information
8.     
No image available
TitleHow to cheat at managing information security
Author(s)Mark Osborne
PublicationMumbai, Shroff Publishers and Distributors Pvt. Ltd., 2006.
Description315p.
ISBN,Price9788184042023 : Rs. 400.00
Classification681.31
Keyword(s)1. COMPUTER SECURITY 2. INFORMATION SECURITY
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
021364   681.31/OSB/021364  On Shelf    

+Copy Specific Information
9.     
No image available
TitleProtecting information: From classical error correction to quantum crytography
Author(s)Susan Loepp;William K. Wootters
PublicationCambridge, Cambridge University Press, 2006.
Description287p.
ISBN,Price9780521534765 : US $29.99
Classification003.26:511:530.145.6
Keyword(s)1. CODING 2. COMPUTER SECURITY 3. CRYPTOGRAPHY 4. DIGITAL INFORMATION 5. QUANTUM COMPUTERS 6. QUANTUM CRYPTOGRAPHY 7. QUANTUM MECHANICS
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
021064   003.26:511:530.145.6/LOE/021064  On Shelf    

+Copy Specific Information
10.    
No image available
TitleSecurity in computing : 3rd Edition
Author(s)Charles P.Pfleeger;Shari Lawrence Pfleeger
Edition3rd ed Low price edition
PublicationDelhi, Pearson Education, 2003.
Descriptionxxix, 746 p.
Series(PRENTICE HALL PROFESSIONAL TECHNICAL REFERNCE (PH PTR))
ISBN,Price8129700425 : Rs 325.00
Classification681.31
Keyword(s)1. CODE - COMPUTING SECURITY 2. COMPUTER SECURITY 3. ENCRYPTION - SECURITY CONTROL - COMPUTER SECURITY 4. LAW - COMPUTER SECURITY RISK 5. MANAGEMENT - COMPUTING SECURITY 6. SECURITY - COMPUTING
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
020026   681.31/PFL/020026  On Shelf    

+Copy Specific Information
(page:1 / 2) [#12]    Next Page   Last Page