1.

Record Nr.

UNINA9910827151103321

Autore

Dauphiné André

Titolo

Modèles Géographiques Avec le Langage Mathematica / / André Dauphiné

Pubbl/distr/stampa

London : , : ISTE Editions Ltd., , 2017

ISBN

1-78406-236-7

Descrizione fisica

1 online resource (333 pages)

Collana

Collection systèmes d'information, web et société

Disciplina

910.0151

Soggetti

Geography - Mathematical models

Lingua di pubblicazione

Francese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Intro -- Table des matières -- Introduction -- PARTIE 1. Modéliser les relationssociétés-nature -- Introduction de la partie 1 -- Chapitre 1. Paradoxes théoriquesde la géographie classique -- Chapitre 2. Modèles statistiques et probabilistesdes relations sociétés-nature -- Chapitre 3. Modèles de systèmesdynamiques ordinaires -- PARTIE 2. Modéliserles localisations géographiques -- Introduction de la partie 2 -- Chapitre 4. Théories des localisationsgéographiques -- Chapitre 5. Modèles des localisationsgéographiques -- PARTIE 3. Structures spatialeset dynamiques territoriales -- Introduction de la partie 3 -- Chapitre 6. Théoriser les structureset les dynamiques territoriales -- Chapitre 7. Modèlesde points et de champs -- Chapitre 8Modèles de réseaux -- Chapitre 9Modèlesde l'espace géographique -- Chapitre 10.Macro et micro-modèlesde la morphogénie -- Conclusion -- Bibliographie -- Index.



2.

Record Nr.

UNINA9910484587203321

Titolo

Information Systems Security : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005

Edizione

[1st ed. 2005.]

Descrizione fisica

1 online resource (XII, 342 p.)

Collana

Security and Cryptology, , 2946-1863 ; ; 3803

Altri autori (Persone)

JajodiaSushil

MazumdarChandan

Disciplina

005.8

Soggetti

Cryptography

Data encryption (Computer science)

Computer networks

Operating systems (Computers)

Computers and civilization

Electronic data processing - Management

Information storage and retrieval systems

Cryptology

Computer Communication Networks

Operating Systems

Computers and Society

IT Operations

Information Storage and Retrieval

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry -- Auditable Anonymous Delegation -- A Robust Double Auction Protocol



Based on a Hybrid Trust Model -- VTrust: A Trust Management System Based on a Vector Model of Trust -- Analysis and Modelling of Trust in Distributed Information Systems -- EPAL Based Privacy Enforcement Using ECA Rules -- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies -- Protection of Relationships in XML Documents with the XML-BB Model -- EISA – An Enterprise Application Security Solution for Databases -- Event Detection in Multilevel Secure Active Databases -- Key Management for Multicast Fingerprinting -- A Key Reshuffling Scheme for Wireless Sensor Networks -- CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks -- A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks -- Detecting ARP Spoofing: An Active Technique -- Episode Based Masquerade Detection -- A Game-Theoretic Approach to Credit Card Fraud Detection -- Modifications of SHA-0 to Prevent Attacks -- How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes -- On Broadcast Encryption with Random Key Pre-distribution Schemes -- A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field -- SPEAR: Design of a Secured Peer-to-Peer Architecture -- A Web-Enabled EnterpriseSecurity Management Framework Based on a Unified Model of Enterprise Information System Security -- Development of a Comprehensive Intrusion Detection System – Challenges and Approaches -- A Transparent End-to-End Security Solution.