04703nam 22006975 450 991029957410332120200703152828.03-319-72119-410.1007/978-3-319-72119-4(CKB)4100000001794698(DE-He213)978-3-319-72119-4(MiAaPQ)EBC6315036(MiAaPQ)EBC5589196(Au-PeEL)EBL5589196(OCoLC)1021192214(PPN)223958182(EXLCZ)99410000000179469820180130d2018 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierPractical Information Security A Competency-Based Education Course /by Izzat Alsmadi, Robert Burdwell, Ahmed Aleroud , Abdallah Wahbeh, Mahmoud Al-Qudah, Ahmad Al-Omari1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XIII, 314 p. 185 illus., 144 illus. in color.)Includes index.3-319-72118-6 Introduction -- Information Systems Security -- Malicious Attacks, Threats, and Vulnerabilities -- Access Controls -- Security Operations and Administration -- Auditing, Testing, and Monitoring -- Risk, Response, and Recovery -- Cryptography -- Networks and Telecommunications Security -- Source Code Security -- Information Security Standards -- Information Systems Security Education and Training -- U.S. Compliance Laws -- Conclusion.This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a balance between background knowledge, context, and skills they can put to work. Students will learn both the foundations and applications of information systems security; safeguarding from malicious attacks, threats, and vulnerabilities; auditing, testing, and monitoring; risk, response, and recovery; networks and telecommunications security; source code security; information security standards; and compliance laws. The book can be used in introductory courses in security (information, cyber, network or computer security), including classes that don’t specifically use the CBE method, as instructors can adjust methods and ancillaries based on their own preferences. The book content is also aligned with the Cybersecurity Competency Model, proposed by department of homeland security. The author is an active member of The National Initiative for Cybersecurity Education (NICE), which is led by the National Institute of Standards and Technology (NIST). NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.Electrical engineeringComputer securitySystem safetyApplication softwareCommunications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Security Science and Technologyhttps://scigraph.springernature.com/ontologies/product-market-codes/P31080Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Electrical engineering.Computer security.System safety.Application software.Communications Engineering, Networks.Systems and Data Security.Security Science and Technology.Information Systems Applications (incl. Internet).005.8Alsmadi Izzatauthttp://id.loc.gov/vocabulary/relators/aut875246Burdwell Robertauthttp://id.loc.gov/vocabulary/relators/autAleroud  Ahmedauthttp://id.loc.gov/vocabulary/relators/autWahbeh Abdallahauthttp://id.loc.gov/vocabulary/relators/autAl-Qudah Mahmoudauthttp://id.loc.gov/vocabulary/relators/autAl-Omari Ahmadauthttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK9910299574103321Practical Information Security2512077UNINA03317nam 2200589Ia 450 991073944690332120200520144314.01-4614-6759-410.1007/978-1-4614-6759-5(CKB)2560000000102855(EBL)1697822(OCoLC)902411610(SSID)ssj0000905947(PQKBManifestationID)11530124(PQKBTitleCode)TC0000905947(PQKBWorkID)10930088(PQKB)10717258(DE-He213)978-1-4614-6759-5(MiAaPQ)EBC1697822(PPN)169136647(EXLCZ)99256000000010285520130430d2013 uy 0engur|n|---|||||txtccr3D video coding for embedded devices energy efficient algorithms and architectures /Bruno Zatt ...[et. al.]1st ed. 2013.New York Springer Science20131 online resource (219 p.)Description based upon print version of record.1-4614-6758-6 Includes bibliographical references and index.Introduction -- Background and Related Work -- Multiview Video Coding Analysis for Energy and Quality -- Energy-Effiecient Algorithms for Multiview Video Coding -- Energy-Efficient Architectures for Multiview Video Coding -- Results and Comparison -- Conclusion and future Works.This book shows readers how to develop energy-efficient algorithms and hardware architectures to enable high-definition 3D video coding on resource-constrained embedded devices.  Users of the Multiview Video Coding (MVC) standard face the challenge of exploiting its 3D video-specific coding tools for increasing compression efficiency at the cost of increasing computational complexity and, consequently, the energy consumption.  This book enables readers to reduce the multiview video coding energy consumption through jointly considering the algorithmic and architectural levels.  Coverage includes an introduction to 3D videos and an extensive discussion of the current state-of-the-art of 3D video coding, as well as energy-efficient algorithms for 3D video coding and energy-efficient hardware architecture for 3D video coding.     ·         Discusses challenges related to performance and power in 3D video coding for embedded devices; ·         Describes energy-efficient algorithms for reducing computational complexity at multiple hierarchical levels; ·         Presents energy-efficient hardware architectures along with methods for reducing on-chip and off-chip energy related to both data processing and memory access; ·         Shows how to leverage jointly the algorithm and hardware architecture layers of the system.Video compressionDigital videoVideo compression.Digital video.004.1006.22620621.381Zatt Bruno1424567MiAaPQMiAaPQMiAaPQBOOK99107394469033213D Video Coding for Embedded Devices3553863UNINA