Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 5 of 15
Previous Record Next Record
E-Book/E-Doc

Title Advances in computers. Volume 102 / volume editor, Ali Hurson, Maziar Goudarzi.

Publication Info. Amsterdam : Academic Press, 2016.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Series Advances in Computers ; Volume 102
Note 1. Advances in Software Engineering and Software Assurance>Dan Shoemaker, Carol Woody and Nancy R. Mead>2. Privacy Challenges and Goals in mHealth Systems>Farzana Rahman, Ivor D Addo and Sheikh Iqbal Ahamed, Ji-Jiang Yang and Qing Wang>3. A Survey of Data Cleansing Techniques for Cyber-Physical Critical Infrastructure Systems>Mark Woodard, Michael Wisely and Sahra Sedigh Sarvestani>4. Indexing and Querying Techniques for Moving Objects in Both Euclidean Space and Road Network>Lasanthi Heendaliya, Michael Wisely, Dan Lin, Sahra Sedigh Sarvestani and Ali Hurson.
CIP data; item not viewed.
Summary Advances in Computers, an ongoing series since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references and continue to be of significant, lasting value in this rapidly expanding field.
Contents Front Cover; Advances in Computers; Copyright; Contents; Preface; Chapter One: Advances in Software Engineering and Software Assurance; 1. Introduction; 2. Structured Programming: The Dawn of a New Era; 2.1. The GOTO Statement; 2.2. Structured Programming as a Solution; 2.3. IBM Training; 3. Language Support for Structured Programming; 3.1. FORTRAN; 3.2. ALGOL 60; 3.3. Intersection of Languages and a New Paradigm; 3.4. Software Engineering; 3.5. SE Education; 4. Computing Meets Reality: The Protection of Information in Computers; 4.1. The SAGE and SABRE Networks; 4.2. ARPANET
4.3. Crime and Computers4.4. Strategies for Protecting Data; 4.5. Technology and Threats Converge; 4.6. Before the Internet; 4.7. Software Assurance; 5. Security Gets Serious: Societal Responses and the Morris Worm; 5.1. Computer Viruses; 5.2. Viruses ``In the Wild; 5.3. The Morris Worm; 5.4. The Computer Fraud and Abuse Act; 5.5. Punishment Under the Law; 5.6. The CERT/CC; 6. Software as a Commodity and the Rise of the SE Best Practice Approach; 6.1. Personal Computers; 6.2. Application Software; 6.3. Flawed Software Development; 6.4. The Software Engineering Institute
6.5. Master in Software Engineering6.6. Software Process; 6.7. WGSEET; 6.8. Undergraduate Software Development Degrees; 6.9. SE as a Profession; 7. The Rise of the Internet and the Advent of Formal Software and System Security Programs; 7.1. The Early Internet; 7.2. Computer Security and the Growing Internet; 7.3. Organized Incident Response; 7.4. Incident Management; 7.5. Malware; 7.6. The Need for Defect-Free Software; 7.6.1. Build Security In; 7.6.2. CWE Project; 7.7. Summary; 8. Cybersecurity Becomes a Societal Issue: Legal Frameworks; 8.1. The E-Government Act of 2002
8.2. Federal Information Security Management Act (FISMA)8.2.1. Standards, Guidelines, and Associated Methods and Techniques; 8.2.2. Security Requirements; 8.3. Summary; 9. Complexity and Supply Chains: The Need for Broad-Scale Integration; 9.1. Integrated Complex Applications; 9.2. Component Complexity and Virtuality; 9.3. The Technology Supply Chain; 9.3.1. Risks to Critical Infrastructure; 9.3.2. Supply Chain Risk Management (SCRM); 9.4. Summary; 10. Where We Are Now; Acknowledgments; References; Chapter Two: Privacy Challenges and Goals in mHealth Systems; 1. Introduction
2. Technologies Used in mHealth3. Major Privacy Challenges; 3.1. Privacy Challenges While Using Radio Frequency Identification in mHealth Application; 3.2. Privacy Challenges in Cell Phone-Based mHealth Services; 3.3. Privacy Challenges in Social Networking and Care Coordination Technologies; 4. Significance of Privacy in mHealth; 5. Solving Privacy Problems with Various Methods; 5.1. Encryption Methods; 5.2. Access Control Mechanisms; 5.3. Remote Data Checking Using Provable Data Possession; 5.4. Privacy-Preserving Data Integrity Checking; 5.5. Privacy-Preserving Public Auditability
Subject Graphical user interfaces (Computer systems)
System analysis.
Interfaces graphiques (Informatique)
Analyse de systèmes.
systems analysis.
Graphical user interfaces (Computer systems)
System analysis
Added Author Hurson, A. R., editor.
Goudarzi, Maziar, editor.
Other Form: Print version : 9780128099193
ISBN 9780128051689 (ePub ebook)
012805168X (ePub ebook)
9780128099193 (hbk.)
Standard No. UKMGB 017926357
AU@ 000058863227

 
    
Available items only