top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Communications and information infrastructure security / / edited by John G. Voeller
Communications and information infrastructure security / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (124 p.)
Disciplina 005.8
Altri autori (Persone) VoellerJohn G
Soggetto topico Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-118-65183-9
1-118-65170-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 Telecommunication: Critical Infrastructure Protection; 1.1 Introduction; 1.2 Overview; 1.3 Evolutionary Forces That Shape the Sector; 1.3.1 Unregulated Beginnings; 1.3.2 The Telecom War; 1.3.3 Regulatory Period; 1.7.1 The Hubs: Telecom Hotels; 1.3.4 Deregulated Oligopolies; 1.4 Major Components of the Sector; 1.5 Resiliency of Networks; 1.5.1 Hubs, Clusters, and Betweeners; 1.5.2 Betweenness; 1.6 Resilience Results; 1.6.1 Cascade Resiliency; 1.6.2 Flow Resiliency; 1.7 Telecommunications Criticality; 1.7.2 Self-Organized Criticality
1.8 Final AnalysisReferences; Further Reading; Chapter 2 Strategies for Protecting the Telecommunications Sector; 2.1 Introduction; 2.2 Background; 2.2.1 A Historical Perspective; 2.2.2 What Makes Up The Telecommunications Sector?; 2.2.3 How Do We Secure the Telecommunications Sector?; 2.2.4 What are Critical Telecommunications Infrastructure Systems and Assets?; 2.2.5 What is the U.S. Policy on Protecting National Critical Telecommunications Services and Computer-Driven Systems?; 2.3 Threats, Challenges, and Continuous Improvement; 2.3.1 The General Threat Assessment
2.3.2 The Threat to America's Telecommunications Components2.3.3 The Threat to America's Internet Networks; 2.4 Telecommunications Challenges and Continuous Improvement; 2.5 Conclusions; 2.5.1 Performance, Reliability and Efficiency; 2.5.2 The Threat to America's Telecommunications Sector; 2.5.3 Future Research Direction; 2.5.4 The Prospects for the Future; References; Further Reading; Chapter 3 Wireless Security; 3.1 Scientific Overview; 3.1.1 Voice-Centric Networks; 3.1.2 Data-Centric Networks; 3.2 Mobile and Wireless Security Landscape; 3.2.1 Federal Legislation and Regulation
3.2.2 Federal Standards and Guidance Publications3.2.3 Industry Standards and Guidance Organizations; 3.2.4 Governmental Wireless Communications Initiatives; 3.3 Critical Needs Analysis; 3.3.1 Intrusion Prevention Systems; 3.3.2 Internet-Based Security Protocols; 3.4 Research Directions; 3.4.1 Intrusion Prevention Systems; 3.4.2 Internet-Based Security Protocols; 3.4.3 Overlaying Security Services over IP-based Access Networks; 3.4.4 Mobile Device Security; References; Further Reading; Chapter 4 Detection of Hidden Information, Covert Channels and Information Flows; 4.1 Introduction
4.2 Scientific Overview4.2.1 Hiding Information; 4.3 Countermeasures; 4.3.1 Countermeasures: Detection; 4.3.2 Countermeasures: Disruption; 4.4 Research and Development Trends; 4.4.1 Research Trends; 4.4.2 Development Trends; 4.5 Critical Needs Analysis; 4.6 Research Directions; References; Further Reading; Other Suggested Reading; Chapter 5 Inherently Secure Next-Generation Computing and Communication Networks for Reducing Cascading Impacts; 5.1 Introduction; 5.2 Standards, Guidelines, and Best Practices; 5.3 Standards; 5.3.1 Guidelines; 5.4 Best Practice
5.4.1 Cyber and Control Systems Security Standards in Common Use
Record Nr. UNINA-9910453407503321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communications and information infrastructure security / / edited by John G. Voeller
Communications and information infrastructure security / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (124 p.)
Disciplina 005.8
Altri autori (Persone) VoellerJohn G
Soggetto topico Computer networks - Security measures
ISBN 1-118-65183-9
1-118-65170-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 Telecommunication: Critical Infrastructure Protection; 1.1 Introduction; 1.2 Overview; 1.3 Evolutionary Forces That Shape the Sector; 1.3.1 Unregulated Beginnings; 1.3.2 The Telecom War; 1.3.3 Regulatory Period; 1.7.1 The Hubs: Telecom Hotels; 1.3.4 Deregulated Oligopolies; 1.4 Major Components of the Sector; 1.5 Resiliency of Networks; 1.5.1 Hubs, Clusters, and Betweeners; 1.5.2 Betweenness; 1.6 Resilience Results; 1.6.1 Cascade Resiliency; 1.6.2 Flow Resiliency; 1.7 Telecommunications Criticality; 1.7.2 Self-Organized Criticality
1.8 Final AnalysisReferences; Further Reading; Chapter 2 Strategies for Protecting the Telecommunications Sector; 2.1 Introduction; 2.2 Background; 2.2.1 A Historical Perspective; 2.2.2 What Makes Up The Telecommunications Sector?; 2.2.3 How Do We Secure the Telecommunications Sector?; 2.2.4 What are Critical Telecommunications Infrastructure Systems and Assets?; 2.2.5 What is the U.S. Policy on Protecting National Critical Telecommunications Services and Computer-Driven Systems?; 2.3 Threats, Challenges, and Continuous Improvement; 2.3.1 The General Threat Assessment
2.3.2 The Threat to America's Telecommunications Components2.3.3 The Threat to America's Internet Networks; 2.4 Telecommunications Challenges and Continuous Improvement; 2.5 Conclusions; 2.5.1 Performance, Reliability and Efficiency; 2.5.2 The Threat to America's Telecommunications Sector; 2.5.3 Future Research Direction; 2.5.4 The Prospects for the Future; References; Further Reading; Chapter 3 Wireless Security; 3.1 Scientific Overview; 3.1.1 Voice-Centric Networks; 3.1.2 Data-Centric Networks; 3.2 Mobile and Wireless Security Landscape; 3.2.1 Federal Legislation and Regulation
3.2.2 Federal Standards and Guidance Publications3.2.3 Industry Standards and Guidance Organizations; 3.2.4 Governmental Wireless Communications Initiatives; 3.3 Critical Needs Analysis; 3.3.1 Intrusion Prevention Systems; 3.3.2 Internet-Based Security Protocols; 3.4 Research Directions; 3.4.1 Intrusion Prevention Systems; 3.4.2 Internet-Based Security Protocols; 3.4.3 Overlaying Security Services over IP-based Access Networks; 3.4.4 Mobile Device Security; References; Further Reading; Chapter 4 Detection of Hidden Information, Covert Channels and Information Flows; 4.1 Introduction
4.2 Scientific Overview4.2.1 Hiding Information; 4.3 Countermeasures; 4.3.1 Countermeasures: Detection; 4.3.2 Countermeasures: Disruption; 4.4 Research and Development Trends; 4.4.1 Research Trends; 4.4.2 Development Trends; 4.5 Critical Needs Analysis; 4.6 Research Directions; References; Further Reading; Other Suggested Reading; Chapter 5 Inherently Secure Next-Generation Computing and Communication Networks for Reducing Cascading Impacts; 5.1 Introduction; 5.2 Standards, Guidelines, and Best Practices; 5.3 Standards; 5.3.1 Guidelines; 5.4 Best Practice
5.4.1 Cyber and Control Systems Security Standards in Common Use
Record Nr. UNINA-9910791090203321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communications and information infrastructure security / / edited by John G. Voeller
Communications and information infrastructure security / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (124 p.)
Disciplina 005.8
Altri autori (Persone) VoellerJohn G
Soggetto topico Computer networks - Security measures
ISBN 1-118-65183-9
1-118-65170-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 Telecommunication: Critical Infrastructure Protection; 1.1 Introduction; 1.2 Overview; 1.3 Evolutionary Forces That Shape the Sector; 1.3.1 Unregulated Beginnings; 1.3.2 The Telecom War; 1.3.3 Regulatory Period; 1.7.1 The Hubs: Telecom Hotels; 1.3.4 Deregulated Oligopolies; 1.4 Major Components of the Sector; 1.5 Resiliency of Networks; 1.5.1 Hubs, Clusters, and Betweeners; 1.5.2 Betweenness; 1.6 Resilience Results; 1.6.1 Cascade Resiliency; 1.6.2 Flow Resiliency; 1.7 Telecommunications Criticality; 1.7.2 Self-Organized Criticality
1.8 Final AnalysisReferences; Further Reading; Chapter 2 Strategies for Protecting the Telecommunications Sector; 2.1 Introduction; 2.2 Background; 2.2.1 A Historical Perspective; 2.2.2 What Makes Up The Telecommunications Sector?; 2.2.3 How Do We Secure the Telecommunications Sector?; 2.2.4 What are Critical Telecommunications Infrastructure Systems and Assets?; 2.2.5 What is the U.S. Policy on Protecting National Critical Telecommunications Services and Computer-Driven Systems?; 2.3 Threats, Challenges, and Continuous Improvement; 2.3.1 The General Threat Assessment
2.3.2 The Threat to America's Telecommunications Components2.3.3 The Threat to America's Internet Networks; 2.4 Telecommunications Challenges and Continuous Improvement; 2.5 Conclusions; 2.5.1 Performance, Reliability and Efficiency; 2.5.2 The Threat to America's Telecommunications Sector; 2.5.3 Future Research Direction; 2.5.4 The Prospects for the Future; References; Further Reading; Chapter 3 Wireless Security; 3.1 Scientific Overview; 3.1.1 Voice-Centric Networks; 3.1.2 Data-Centric Networks; 3.2 Mobile and Wireless Security Landscape; 3.2.1 Federal Legislation and Regulation
3.2.2 Federal Standards and Guidance Publications3.2.3 Industry Standards and Guidance Organizations; 3.2.4 Governmental Wireless Communications Initiatives; 3.3 Critical Needs Analysis; 3.3.1 Intrusion Prevention Systems; 3.3.2 Internet-Based Security Protocols; 3.4 Research Directions; 3.4.1 Intrusion Prevention Systems; 3.4.2 Internet-Based Security Protocols; 3.4.3 Overlaying Security Services over IP-based Access Networks; 3.4.4 Mobile Device Security; References; Further Reading; Chapter 4 Detection of Hidden Information, Covert Channels and Information Flows; 4.1 Introduction
4.2 Scientific Overview4.2.1 Hiding Information; 4.3 Countermeasures; 4.3.1 Countermeasures: Detection; 4.3.2 Countermeasures: Disruption; 4.4 Research and Development Trends; 4.4.1 Research Trends; 4.4.2 Development Trends; 4.5 Critical Needs Analysis; 4.6 Research Directions; References; Further Reading; Other Suggested Reading; Chapter 5 Inherently Secure Next-Generation Computing and Communication Networks for Reducing Cascading Impacts; 5.1 Introduction; 5.2 Standards, Guidelines, and Best Practices; 5.3 Standards; 5.3.1 Guidelines; 5.4 Best Practice
5.4.1 Cyber and Control Systems Security Standards in Common Use
Record Nr. UNINA-9910820389703321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security / / edited by John G. Voeller
Cyber security / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (126 p.)
Disciplina 005.8
Altri autori (Persone) VoellerJohn G
Soggetto topico Computer networks - Security measures
Cyberspace - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-118-65168-5
1-118-65173-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 Cyber Security Metrics and Measure; 1.1 Introduction; 1.2 Contrasting Metrics and Measures; 1.3 Selecting Measures to Support Metrics; 1.4 Problems with the Accuracy of Measures; 1.5 Problems with the Selection of Measures; 1.6 Problems with the Use of Measures; 1.7 Common Vulnerability Scoring System (CVSS); 1.8 Research Directions; References; Further Reading; Chapter 2 Multilevel Security; 2.1 Introduction; 2.2 Background; 2.3 Multilevel Security Policies; 2.3.1 Confinement; 2.3.2 Supporting Policies; 2.3.3 Trusted Subjects
2.4 Enforcement of Multilevel Security Policies2.4.1 Design Approaches; 2.4.2 Threats to MLS Systems; 2.4.3 Assurance; 2.4.4 Secure MLS System Development; 2.4.5 Covert Channels; 2.4.6 Object Reuse Considerations; 2.4.7 Target Environment; 2.4.8 Cascade Problem; 2.5 Platforms and Architectures for Multilevel Security; 2.5.1 Use of Applications in MLS Systems; 2.6 Conclusion; References; Chapter 3 Trusted Platforms: The Root of Security; 3.1 Introduction; 3.2 The State of Trusted Computing; 3.2.1 Why Hardware Security?; 3.2.2 Essentials of Trusted Computing; 3.2.3 Extension to Storage
3.2.4 Biometric Devices as Physical Interface3.2.5 Usage Model; 3.3 International Scope; 3.3.1 Integration; 3.3.2 Trusted Software; 3.3.3 Networking Trusted Platforms; 3.4 Expanding the Ring of Trust; 3.5 Remaining Challenges; References; Further Reading; Chapter 4 Cyber Security Technology Usability and Management; 4.1 Introduction; 4.2 Usability and Security: Current Research; 4.2.1 Improving Existing Security Technologies; 4.3 Systems Management; 4.4 Web Security and Phishing; 4.4.1 Designing New Technologies with Usability in Mind; 4.4.2 Design Guidelines for Building Better Systems
4.5 Open Challenges and Take-Aways4.6 Conclusions; References; Further Reading; Chapter 5 Security of Distributed, Ubiquitous, and Embedded Computing Platforms; 5.1 Introduction; 5.2 Scientific Overview; 5.2.1 Security Properties; 5.2.2 Constraints on the Design Space; 5.2.3 Solution Approaches; 5.2.4 Physical Layer; 5.2.5 Networking Layers; 5.2.6 Middleware and Applications; 5.3 Global Research and Funding; 5.4 Critical Needs Analysis; 5.5 Research Directions; References; Further Reading; Chapter 6 Advanced Attacker Detection and Understanding with Emerging Honeynet Technologies
6.1 Honeypot Essentials6.2 Honeypot Risk; Legal and Ethical Issues; 6.3 Honeynet Technologies; 6.3.1 Generation III Honeynet; 6.3.2 Global Distributed Honeynet (GDH); 6.3.3 Honeyclients; 6.3.4 Low-Interaction Malware Collectors; References; Chapter 7 Security of Web Application and Services and Service-Oriented Architectures; 7.1 Introduction; 7.2 SOA Security Challenges; 7.3 Secure Web Services for SOA; 7.3.1 Transport-Based Security; 7.3.2 Message-Based Security; 7.4 Web Service Security Directions; 7.4.1 Federation; 7.4.2 Identity; 7.5 Summary; References
Chapter 8 Industrial Process Control System Security
Record Nr. UNINA-9910453408603321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security / / edited by John G. Voeller
Cyber security / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (126 p.)
Disciplina 005.8
Altri autori (Persone) VoellerJohn G
Soggetto topico Computer networks - Security measures
Cyberspace - Security measures
ISBN 1-118-65168-5
1-118-65173-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 Cyber Security Metrics and Measure; 1.1 Introduction; 1.2 Contrasting Metrics and Measures; 1.3 Selecting Measures to Support Metrics; 1.4 Problems with the Accuracy of Measures; 1.5 Problems with the Selection of Measures; 1.6 Problems with the Use of Measures; 1.7 Common Vulnerability Scoring System (CVSS); 1.8 Research Directions; References; Further Reading; Chapter 2 Multilevel Security; 2.1 Introduction; 2.2 Background; 2.3 Multilevel Security Policies; 2.3.1 Confinement; 2.3.2 Supporting Policies; 2.3.3 Trusted Subjects
2.4 Enforcement of Multilevel Security Policies2.4.1 Design Approaches; 2.4.2 Threats to MLS Systems; 2.4.3 Assurance; 2.4.4 Secure MLS System Development; 2.4.5 Covert Channels; 2.4.6 Object Reuse Considerations; 2.4.7 Target Environment; 2.4.8 Cascade Problem; 2.5 Platforms and Architectures for Multilevel Security; 2.5.1 Use of Applications in MLS Systems; 2.6 Conclusion; References; Chapter 3 Trusted Platforms: The Root of Security; 3.1 Introduction; 3.2 The State of Trusted Computing; 3.2.1 Why Hardware Security?; 3.2.2 Essentials of Trusted Computing; 3.2.3 Extension to Storage
3.2.4 Biometric Devices as Physical Interface3.2.5 Usage Model; 3.3 International Scope; 3.3.1 Integration; 3.3.2 Trusted Software; 3.3.3 Networking Trusted Platforms; 3.4 Expanding the Ring of Trust; 3.5 Remaining Challenges; References; Further Reading; Chapter 4 Cyber Security Technology Usability and Management; 4.1 Introduction; 4.2 Usability and Security: Current Research; 4.2.1 Improving Existing Security Technologies; 4.3 Systems Management; 4.4 Web Security and Phishing; 4.4.1 Designing New Technologies with Usability in Mind; 4.4.2 Design Guidelines for Building Better Systems
4.5 Open Challenges and Take-Aways4.6 Conclusions; References; Further Reading; Chapter 5 Security of Distributed, Ubiquitous, and Embedded Computing Platforms; 5.1 Introduction; 5.2 Scientific Overview; 5.2.1 Security Properties; 5.2.2 Constraints on the Design Space; 5.2.3 Solution Approaches; 5.2.4 Physical Layer; 5.2.5 Networking Layers; 5.2.6 Middleware and Applications; 5.3 Global Research and Funding; 5.4 Critical Needs Analysis; 5.5 Research Directions; References; Further Reading; Chapter 6 Advanced Attacker Detection and Understanding with Emerging Honeynet Technologies
6.1 Honeypot Essentials6.2 Honeypot Risk; Legal and Ethical Issues; 6.3 Honeynet Technologies; 6.3.1 Generation III Honeynet; 6.3.2 Global Distributed Honeynet (GDH); 6.3.3 Honeyclients; 6.3.4 Low-Interaction Malware Collectors; References; Chapter 7 Security of Web Application and Services and Service-Oriented Architectures; 7.1 Introduction; 7.2 SOA Security Challenges; 7.3 Secure Web Services for SOA; 7.3.1 Transport-Based Security; 7.3.2 Message-Based Security; 7.4 Web Service Security Directions; 7.4.1 Federation; 7.4.2 Identity; 7.5 Summary; References
Chapter 8 Industrial Process Control System Security
Record Nr. UNINA-9910791090303321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber security / / edited by John G. Voeller
Cyber security / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (126 p.)
Disciplina 005.8
Altri autori (Persone) VoellerJohn G
Soggetto topico Computer networks - Security measures
Cyberspace - Security measures
ISBN 1-118-65168-5
1-118-65173-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 Cyber Security Metrics and Measure; 1.1 Introduction; 1.2 Contrasting Metrics and Measures; 1.3 Selecting Measures to Support Metrics; 1.4 Problems with the Accuracy of Measures; 1.5 Problems with the Selection of Measures; 1.6 Problems with the Use of Measures; 1.7 Common Vulnerability Scoring System (CVSS); 1.8 Research Directions; References; Further Reading; Chapter 2 Multilevel Security; 2.1 Introduction; 2.2 Background; 2.3 Multilevel Security Policies; 2.3.1 Confinement; 2.3.2 Supporting Policies; 2.3.3 Trusted Subjects
2.4 Enforcement of Multilevel Security Policies2.4.1 Design Approaches; 2.4.2 Threats to MLS Systems; 2.4.3 Assurance; 2.4.4 Secure MLS System Development; 2.4.5 Covert Channels; 2.4.6 Object Reuse Considerations; 2.4.7 Target Environment; 2.4.8 Cascade Problem; 2.5 Platforms and Architectures for Multilevel Security; 2.5.1 Use of Applications in MLS Systems; 2.6 Conclusion; References; Chapter 3 Trusted Platforms: The Root of Security; 3.1 Introduction; 3.2 The State of Trusted Computing; 3.2.1 Why Hardware Security?; 3.2.2 Essentials of Trusted Computing; 3.2.3 Extension to Storage
3.2.4 Biometric Devices as Physical Interface3.2.5 Usage Model; 3.3 International Scope; 3.3.1 Integration; 3.3.2 Trusted Software; 3.3.3 Networking Trusted Platforms; 3.4 Expanding the Ring of Trust; 3.5 Remaining Challenges; References; Further Reading; Chapter 4 Cyber Security Technology Usability and Management; 4.1 Introduction; 4.2 Usability and Security: Current Research; 4.2.1 Improving Existing Security Technologies; 4.3 Systems Management; 4.4 Web Security and Phishing; 4.4.1 Designing New Technologies with Usability in Mind; 4.4.2 Design Guidelines for Building Better Systems
4.5 Open Challenges and Take-Aways4.6 Conclusions; References; Further Reading; Chapter 5 Security of Distributed, Ubiquitous, and Embedded Computing Platforms; 5.1 Introduction; 5.2 Scientific Overview; 5.2.1 Security Properties; 5.2.2 Constraints on the Design Space; 5.2.3 Solution Approaches; 5.2.4 Physical Layer; 5.2.5 Networking Layers; 5.2.6 Middleware and Applications; 5.3 Global Research and Funding; 5.4 Critical Needs Analysis; 5.5 Research Directions; References; Further Reading; Chapter 6 Advanced Attacker Detection and Understanding with Emerging Honeynet Technologies
6.1 Honeypot Essentials6.2 Honeypot Risk; Legal and Ethical Issues; 6.3 Honeynet Technologies; 6.3.1 Generation III Honeynet; 6.3.2 Global Distributed Honeynet (GDH); 6.3.3 Honeyclients; 6.3.4 Low-Interaction Malware Collectors; References; Chapter 7 Security of Web Application and Services and Service-Oriented Architectures; 7.1 Introduction; 7.2 SOA Security Challenges; 7.3 Secure Web Services for SOA; 7.3.1 Transport-Based Security; 7.3.2 Message-Based Security; 7.4 Web Service Security Directions; 7.4.1 Federation; 7.4.2 Identity; 7.5 Summary; References
Chapter 8 Industrial Process Control System Security
Record Nr. UNINA-9910818299503321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection and intelligent systems for homeland security. / / edited by John G. Voeller
Detection and intelligent systems for homeland security. / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (129 p.)
Disciplina 006.312
Altri autori (Persone) VoellerJohn G
Soggetto topico Data mining
Computer security
Soggetto genere / forma Electronic books.
ISBN 1-118-78742-0
1-118-78736-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 2D-to-3d Face Recognition Systems; 1.1 Intelligent Video Systems; 1.1.1 The Need for Intelligent Video Systems; 1.1.2 The Barrier to Face; 1.1.3 2D-to-3D Bridges the Performance Gap for Intelligent Video Systems; 1.2 Computational Anatomy and Diffeomorphisms For 2D-TO-3D Model Generation; 1.2.1 Computational Anatomy; 1.2.2 One and Two-View Geometry Generation; 1.2.3 Statistical Validation of 2D-to-3D Model Generation; 1.2.4 Root Mean Squared Error on Controlled and Uncontrolled Imagery; 1.2.5 Rigid Motion Reconstruction Accuracy
1.3 The 2D-To-3D Technology for Photometric Representation1.4 2D-To-3D Geometric Model Normalization; 1.4.1 2D-to-3D Geometric Normalization; 1.4.2 2D-to-3D Photometric Normalization; 1.4.3 Boosting Facial Recognition Systems via 2D-to-3D Geometric Model Generation; 1.5 Pose and Lighting Invariant Facial Recognition Systems Based On 2D-To-3D Geometry Generation; 1.5.1 2D-to-3D Enabled Frontal Pose-Invariant Facial Recognition Systems; 1.5.2 Lighting Invariant 2D-to-3D Facial Recognition Systems; 1.5.3 2D-to-3D Full Profile Identification Systems; 1.6 Conclusion; References
Chapter 2 Eye and Iris Sensors2.1 Biometrics for Human Identification; 2.2 Scientific Overview of Iris Technology; 2.2.1 Technology Basics; 2.2.2 Research Review; 2.3 Challenges in Iris Technology; 2.3.1 Stringent Iris Acquisition Requirements; 2.3.2 Standoff Iris Segmentation Challenges; 2.3.3 Lack of Database Cross Validation; 2.3.4 Image Quality Requirements and Preprocessing; 2.4 Future Research Directions; 2.4.1 Critical Needs Analysis; 2.4.2 Emerging Technical Approaches; 2.5 Conclusion; References; Chapter 3 Craniofacial Aging; 3.1 Scientific Overview
3.1.1 Craniofacial Aging: Findings in Anthropology and Forensics3.2 Critical Needs Analysis; 3.2.1 Longitudinal Face Databases; 3.2.2 Effect of Adult Aging on a Standard Face Recognition Technique; 3.2.3 Face Recognition Using Synthetic Facial Aging; 3.3 Research Directions; References; Chapter 4 Threat Signatures of Explosive Materials; 4.1 Introduction; 4.2 Scientific Overview; 4.2.1 Explosive Terms Defined; 4.3 Elements That Comprise Explosive Materials; 4.4 Vapor Pressure of Explosive Materials; 4.5 Explosives Detection; 4.5.1 Overview; 4.5.2 Trace Explosives Detection
4.5.3 Explosive Vapor Detection4.5.4 Explosive Particle Detection; 4.5.5 Taggants; 4.5.6 Trace Detection Technologies Equipment; 4.5.7 Canine Detection of Explosives; 4.5.8 Bulk Detection; 4.5.9 Electromagnetic Radiation; 4.5.10 Imaging Technologies; 4.5.11 Nuclear-Based Technologies; 4.5.12 Summary and Future Research Directions; 4.6 Research and Funding Data; 4.7 Critical Needs Analysis and Research Directions; Acknowledgment; References; Further Reading; Chapter 5 Radioactive Materials Sensors; 5.1 Introduction; 5.2 Gamma Ray and Neutron Sensing and Spectroscopy; 5.3 Radiation Imaging
5.4 Active Interrogation
Record Nr. UNINA-9910453610803321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection and intelligent systems for homeland security. / / edited by John G. Voeller
Detection and intelligent systems for homeland security. / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (129 p.)
Disciplina 006.312
Altri autori (Persone) VoellerJohn G
Soggetto topico Data mining
Computer security
ISBN 1-118-78742-0
1-118-78736-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 2D-to-3d Face Recognition Systems; 1.1 Intelligent Video Systems; 1.1.1 The Need for Intelligent Video Systems; 1.1.2 The Barrier to Face; 1.1.3 2D-to-3D Bridges the Performance Gap for Intelligent Video Systems; 1.2 Computational Anatomy and Diffeomorphisms For 2D-TO-3D Model Generation; 1.2.1 Computational Anatomy; 1.2.2 One and Two-View Geometry Generation; 1.2.3 Statistical Validation of 2D-to-3D Model Generation; 1.2.4 Root Mean Squared Error on Controlled and Uncontrolled Imagery; 1.2.5 Rigid Motion Reconstruction Accuracy
1.3 The 2D-To-3D Technology for Photometric Representation1.4 2D-To-3D Geometric Model Normalization; 1.4.1 2D-to-3D Geometric Normalization; 1.4.2 2D-to-3D Photometric Normalization; 1.4.3 Boosting Facial Recognition Systems via 2D-to-3D Geometric Model Generation; 1.5 Pose and Lighting Invariant Facial Recognition Systems Based On 2D-To-3D Geometry Generation; 1.5.1 2D-to-3D Enabled Frontal Pose-Invariant Facial Recognition Systems; 1.5.2 Lighting Invariant 2D-to-3D Facial Recognition Systems; 1.5.3 2D-to-3D Full Profile Identification Systems; 1.6 Conclusion; References
Chapter 2 Eye and Iris Sensors2.1 Biometrics for Human Identification; 2.2 Scientific Overview of Iris Technology; 2.2.1 Technology Basics; 2.2.2 Research Review; 2.3 Challenges in Iris Technology; 2.3.1 Stringent Iris Acquisition Requirements; 2.3.2 Standoff Iris Segmentation Challenges; 2.3.3 Lack of Database Cross Validation; 2.3.4 Image Quality Requirements and Preprocessing; 2.4 Future Research Directions; 2.4.1 Critical Needs Analysis; 2.4.2 Emerging Technical Approaches; 2.5 Conclusion; References; Chapter 3 Craniofacial Aging; 3.1 Scientific Overview
3.1.1 Craniofacial Aging: Findings in Anthropology and Forensics3.2 Critical Needs Analysis; 3.2.1 Longitudinal Face Databases; 3.2.2 Effect of Adult Aging on a Standard Face Recognition Technique; 3.2.3 Face Recognition Using Synthetic Facial Aging; 3.3 Research Directions; References; Chapter 4 Threat Signatures of Explosive Materials; 4.1 Introduction; 4.2 Scientific Overview; 4.2.1 Explosive Terms Defined; 4.3 Elements That Comprise Explosive Materials; 4.4 Vapor Pressure of Explosive Materials; 4.5 Explosives Detection; 4.5.1 Overview; 4.5.2 Trace Explosives Detection
4.5.3 Explosive Vapor Detection4.5.4 Explosive Particle Detection; 4.5.5 Taggants; 4.5.6 Trace Detection Technologies Equipment; 4.5.7 Canine Detection of Explosives; 4.5.8 Bulk Detection; 4.5.9 Electromagnetic Radiation; 4.5.10 Imaging Technologies; 4.5.11 Nuclear-Based Technologies; 4.5.12 Summary and Future Research Directions; 4.6 Research and Funding Data; 4.7 Critical Needs Analysis and Research Directions; Acknowledgment; References; Further Reading; Chapter 5 Radioactive Materials Sensors; 5.1 Introduction; 5.2 Gamma Ray and Neutron Sensing and Spectroscopy; 5.3 Radiation Imaging
5.4 Active Interrogation
Record Nr. UNINA-9910791092503321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection and intelligent systems for homeland security. / / edited by John G. Voeller
Detection and intelligent systems for homeland security. / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (129 p.)
Disciplina 006.312
Altri autori (Persone) VoellerJohn G
Soggetto topico Data mining
Computer security
ISBN 1-118-78742-0
1-118-78736-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 2D-to-3d Face Recognition Systems; 1.1 Intelligent Video Systems; 1.1.1 The Need for Intelligent Video Systems; 1.1.2 The Barrier to Face; 1.1.3 2D-to-3D Bridges the Performance Gap for Intelligent Video Systems; 1.2 Computational Anatomy and Diffeomorphisms For 2D-TO-3D Model Generation; 1.2.1 Computational Anatomy; 1.2.2 One and Two-View Geometry Generation; 1.2.3 Statistical Validation of 2D-to-3D Model Generation; 1.2.4 Root Mean Squared Error on Controlled and Uncontrolled Imagery; 1.2.5 Rigid Motion Reconstruction Accuracy
1.3 The 2D-To-3D Technology for Photometric Representation1.4 2D-To-3D Geometric Model Normalization; 1.4.1 2D-to-3D Geometric Normalization; 1.4.2 2D-to-3D Photometric Normalization; 1.4.3 Boosting Facial Recognition Systems via 2D-to-3D Geometric Model Generation; 1.5 Pose and Lighting Invariant Facial Recognition Systems Based On 2D-To-3D Geometry Generation; 1.5.1 2D-to-3D Enabled Frontal Pose-Invariant Facial Recognition Systems; 1.5.2 Lighting Invariant 2D-to-3D Facial Recognition Systems; 1.5.3 2D-to-3D Full Profile Identification Systems; 1.6 Conclusion; References
Chapter 2 Eye and Iris Sensors2.1 Biometrics for Human Identification; 2.2 Scientific Overview of Iris Technology; 2.2.1 Technology Basics; 2.2.2 Research Review; 2.3 Challenges in Iris Technology; 2.3.1 Stringent Iris Acquisition Requirements; 2.3.2 Standoff Iris Segmentation Challenges; 2.3.3 Lack of Database Cross Validation; 2.3.4 Image Quality Requirements and Preprocessing; 2.4 Future Research Directions; 2.4.1 Critical Needs Analysis; 2.4.2 Emerging Technical Approaches; 2.5 Conclusion; References; Chapter 3 Craniofacial Aging; 3.1 Scientific Overview
3.1.1 Craniofacial Aging: Findings in Anthropology and Forensics3.2 Critical Needs Analysis; 3.2.1 Longitudinal Face Databases; 3.2.2 Effect of Adult Aging on a Standard Face Recognition Technique; 3.2.3 Face Recognition Using Synthetic Facial Aging; 3.3 Research Directions; References; Chapter 4 Threat Signatures of Explosive Materials; 4.1 Introduction; 4.2 Scientific Overview; 4.2.1 Explosive Terms Defined; 4.3 Elements That Comprise Explosive Materials; 4.4 Vapor Pressure of Explosive Materials; 4.5 Explosives Detection; 4.5.1 Overview; 4.5.2 Trace Explosives Detection
4.5.3 Explosive Vapor Detection4.5.4 Explosive Particle Detection; 4.5.5 Taggants; 4.5.6 Trace Detection Technologies Equipment; 4.5.7 Canine Detection of Explosives; 4.5.8 Bulk Detection; 4.5.9 Electromagnetic Radiation; 4.5.10 Imaging Technologies; 4.5.11 Nuclear-Based Technologies; 4.5.12 Summary and Future Research Directions; 4.6 Research and Funding Data; 4.7 Critical Needs Analysis and Research Directions; Acknowledgment; References; Further Reading; Chapter 5 Radioactive Materials Sensors; 5.1 Introduction; 5.2 Gamma Ray and Neutron Sensing and Spectroscopy; 5.3 Radiation Imaging
5.4 Active Interrogation
Record Nr. UNINA-9910807477403321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Energy systems security / / edited by John G. Voeller
Energy systems security / / edited by John G. Voeller
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Descrizione fisica 1 online resource (110 p.)
Disciplina 621.31
Altri autori (Persone) VoellerJohn G
Soggetto topico Electric power systems
Soggetto genere / forma Electronic books.
ISBN 1-118-65174-X
1-118-65177-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Contents; Preface; Chapter 1 Comparative Risk Assessment for Energy Systems; 1.1 Introduction; 1.2 Analytical Approach and Methodology; 1.2.1 Severe Accident Database; 1.2.2 Severe Accident Definition; 1.2.3 Consideration of Full Energy Chains; 1.2.4 Normalization and Allocation of Damages; 1.2.5 Simplified Probabilistic Safety Assessment for Nuclear Power Plants; 1.3 Overview and Contents of Ensad; 1.4 Comparative Analysis of Energy Chains; 1.4.1 Aggregated Indicators; 1.4.2 Frequency-Consequence Curves; 1.5 Conclusions and Recommendations; 1.5.1 Comparative Aspects
1.5.2 Selected Future DevelopmentsReferences; Further Reading; Chapter 2 Large-Scale Electricity Transmission Grids: Lessons Learned from the European Electricity Blackouts; 2.1 Introduction; 2.2 Basic Mechanism of Electric Power Transmission in a Large Grid; 2.3 Power Flows in Interconnected Grids; 2.4 The European Interconnected System-the UCTE System; 2.5 Management of the System; 2.5.1 Before Opening of the Market; 2.5.2 In the Open Market; 2.6 The Italian Blackout 2003; 2.6.1 Introduction; 2.6.2 Factual Sequence of Events-Blackout September 28, 2003
2.6.3 Comments on and Interpretations of the Events/Findings2.7 The System Disturbance November 4, 2006; 2.7.1 Situation and Actions before the Disturbance; 2.7.2 Evolvement of the Disturbance; 2.7.3 Consequences of the Opening; 2.7.4 Failures and Mistakes that Led to this Disturbance; 2.8 Unbundling and Decentralization-Features in Contradiction to Security; 2.9 Conclusions; References; Further Reading; Chapter 3 Interdependent Energy Infrastructure Simulation System; 3.1 Introduction; 3.2 Ieiss Simulation Concepts; 3.3 The Complexity of Multiple Infrastructures
3.4 Ieiss Case Study: Urban InterdependenciesReferences; Further Reading; Chapter 4 Object-Oriented Approaches for Integrated Analysis of Interdependent Energy Networks; 4.1 Introduction; 4.2 Scientific Overview; 4.3 System Modeling; 4.4 Classes and Objects Relationships; 4.4.1 Power System Classes; 4.4.2 Hydro Database; 4.4.3 Fuel Network Classes; 4.4.4 Transportation Network Classes; 4.4.5 Objects Relationship; 4.5 Information Platform; 4.6 Scenario Description; 4.7 Case Study Example; 4.7.1 Physical Chilean Networks; 4.7.2 Network Dependencies; 4.7.3 Specific Activity Models; 4.7.4 Results
4.8 ConclusionReferences; Further Reading; Chapter 5 Self-healing and Resilient Energy System; 5.1 Introduction; 5.2 The Bigger Picture; 5.3 Infrastructures Under Threat; 5.4 A Stressed Infrastructure; 5.5 Where are we and How did we Get Here?; 5.6 Chief Grid Problems; 5.7 Options and Possible Futures-What will it Take to Succeed?; 5.8 The Road Ahead; 5.9 Cost and Benefit; 5.10 Next Steps; Acknowledgments; References; Further Reading; Chapter 6 Nano-enabled Power Source; 6.1 Scientific Overview; 6.1.1 High Power Cells; 6.1.2 High Capacity Cells
6.2 Global Effort on Nano-Enabled Power Source Technologies
Record Nr. UNINA-9910453425003321
Hoboken, New Jersey : , : John Wiley & Sons, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui