top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
50 Jahre Universitäts-Informatik in München / / herausgegeben von Arndt Bode, Manfred Broy, Hans-Joachim Bungartz, Florian Matthes
50 Jahre Universitäts-Informatik in München / / herausgegeben von Arndt Bode, Manfred Broy, Hans-Joachim Bungartz, Florian Matthes
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2017
Descrizione fisica 1 online resource (202 pages)
Disciplina 004
Soggetto topico Computer security
User interfaces (Computer systems)
Bioinformatics
Software engineering
Multimedia information systems
Artificial intelligence
Systems and Data Security
User Interfaces and Human Computer Interaction
Computational Biology/Bioinformatics
Software Engineering
Multimedia Information Systems
Artificial Intelligence
ISBN 3-662-54712-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Nota di contenuto 50 Jahre Informatik an den Universitäten in München -- Cybersicherheit Beyond 2020 -- Allgegenwärtige Mensch-Computer-Interaktion -- Software-Verifikation -- Innovationszentrum Mobiles Internet ZD.B -- Medieninformatik und Mensch-Computer-Interaktion an der LMU München -- Neuro-Robotics -- Herausforderungen an der Schnittstelle von Informatik und Gesellschaft -- Die Evolution des Hauptspeicher-Datenbanksystems HyPer -- Informatik-Forschung für digitale Mobilitätsplattformen. Das Münchner Wissensnetz -- Informatik als Wissenschaft an der Technischen Universität München und ihre Anwendung in Wirtschaft und Gesellschaft. .
Record Nr. UNINA-9910484794303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Die abschnittsbezogene Geschwindigkeitsüberwachung und ihre verfassungsrechtliche Bewertung / / von Jens Christian Keuthen
Die abschnittsbezogene Geschwindigkeitsüberwachung und ihre verfassungsrechtliche Bewertung / / von Jens Christian Keuthen
Autore Keuthen Jens Christian
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer Vieweg, , 2016
Descrizione fisica 1 online resource (495 p.)
Disciplina 340
Collana DuD-Fachbeiträge
Soggetto topico Constitutional law
Administrative law
Computer security
Constitutional Law
Administrative Law
Systems and Data Security
ISBN 3-658-11849-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Nota di contenuto Abschnittsbezogene Geschwindigkeitsüberwachung (Section Control) -- Staatliche Schutzpflicht -- Abwehrrechte überwachter Verkehrsteilnehmer -- Verfassungsrechtliche Rechtfertigung -- Gesetzgebungskompetenz für eine Rechtsgrundlage (de lege ferenda) -- Gestaltungsmaßgaben und -vorschläge.
Record Nr. UNINA-9910483452503321
Keuthen Jens Christian  
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer Vieweg, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Accidental SysAdmin Handbook [[electronic resource] ] : A Primer for Early Level IT Professionals / / by Eric Kralicek
The Accidental SysAdmin Handbook [[electronic resource] ] : A Primer for Early Level IT Professionals / / by Eric Kralicek
Autore Kralicek Eric
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2016
Descrizione fisica 1 online resource (264 p.)
Disciplina 004
Collana The Expert's Voice in System Administration
Soggetto topico Application software
Architecture, Computer
Computer system failures
Operating systems (Computers)
Computer software—Reusability
Computer security
Computer Applications
Computer System Implementation
System Performance and Evaluation
Operating Systems
Performance and Reliability
Systems and Data Security
Soggetto genere / forma Handbooks and manuals.
ISBN 1-4842-1817-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction -- 2. Home Networking -- 3. Planning a Network Environment -- 4. Network Layer Architecture -- 5. Network Service Architecture -- 6. Network Support Plan -- 7. Server Hardware Strategy -- 8. Physical vs. Virtual Server Environments -- 9. Data Storage Tech and User Data Strategy -- 10. Directory Services and Central Account Mgmt -- 11. DNS, DHCP, IP v4 and IP v6 -- 12. Deploying Workstations and Printers -- 13. Antivirus and Security Management -- 14. Intranet, Internet Support Services.
Record Nr. UNINA-9910254754903321
Kralicek Eric  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Achieving and Sustaining Secured Business Operations : An Executive’s Guide to Planning and Management / / by Neelesh Ajmani, Dinesh Kumar
Achieving and Sustaining Secured Business Operations : An Executive’s Guide to Planning and Management / / by Neelesh Ajmani, Dinesh Kumar
Autore Ajmani Neelesh
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017
Descrizione fisica 1 online resource (XVIII, 168 p. 39 illus. in color.)
Disciplina 005.8
Soggetto topico Computer security
Systems and Data Security
ISBN 1-4842-3099-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk Management -- Chapter 3: Secured Business Model -- Chapter 4: Secured Operating Model -- Chapter 5: Secured Management Model -- Chapter 6: Securing Effectiveness -- Chapter 7: Making It Real.- .
Record Nr. UNINA-9910254561903321
Ajmani Neelesh  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Active and Programmable Networks [[electronic resource] ] : IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised Papers / / edited by David Hutchison, Spyros Denazis, Laurent Lefevre, Gary J. Minden
Active and Programmable Networks [[electronic resource] ] : IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised Papers / / edited by David Hutchison, Spyros Denazis, Laurent Lefevre, Gary J. Minden
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 260 p.)
Disciplina 004.6
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Software engineering
Information storage and retrieval
Management information systems
Computer science
Computer security
Application software
Computer Communication Networks
Software Engineering
Information Storage and Retrieval
Management of Computing and Information Systems
Systems and Data Security
Information Systems Applications (incl. Internet)
ISBN 3-642-00972-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Programmable Networks and Heterogeneity -- Validating Inter-domain SLAs with a Programmable Traffic Control System -- Cross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking -- Towards Effective Portability of Packet Handling Applications across Heterogeneous Hardware Platforms -- Architectural Frameworks -- Architecture for an Active Network Infrastructure Grid – The iSEGrid -- Network Services on Service Extensible Routers -- A Network-Based Response Framework and Implementation -- Towards Resilient Networks Using Programmable Networking Technologies -- Node Architectures -- Towards the Design of an Industrial Autonomic Network Node -- A Web Service- and ForCES-Based Programmable Router Architecture -- An Extension to Packet Filtering of Programmable Networks -- Services -- SAND: A Scalable, Distributed and Dynamic Active Networks Directory Service -- A Programmable Structured Peer-to-Peer Overlay -- Interpreted Active Packets for Ephemeral State Processing Routers -- Short Papers -- A Secure Code Deployment Scheme for Active Networks -- Securing AODV Routing Protocol in Mobile Ad-Hoc Networks -- Extensible Network Configuration and Communication Framework -- A Model for Scalable and Autonomic Network Management -- Intelligibility Evaluation of a VoIP Multi-flow Block Interleaver -- A Web-Services Based Architecture for Dynamic-Service Deployment -- The Active Embedded Ubiquitous Web Service Framework -- Framework of an Application-Aware Adaptation Scheme for Disconnected Operations -- Kinetic Multipoint Relaying: Improvements Using Mobility Predictions -- The Three-Level Approaches for Differentiated Service in Clustering Web Server -- On the Manipulation of JPEG2000, In-Flight, Using Active Components on Next Generation Satellites -- TAON: A Topology-Oriented Active Overlay Network Protocol -- A Biologically Inspired Service Architecture in Ubiquitous Computing Environments.
Record Nr. UNISA-996466024703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Ad Hoc Networks : 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers / / edited by Yifeng Zhou, Thomas Kunz
Ad Hoc Networks : 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers / / edited by Yifeng Zhou, Thomas Kunz
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIV, 416 p. 176 illus.)
Disciplina 004.685
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer communication systems
Computer security
Special purpose computers
Data protection
Computer simulation
Electrical engineering
Computer Communication Networks
Systems and Data Security
Special Purpose and Application-Based Systems
Security
Simulation and Modeling
Communications Engineering, Networks
ISBN 3-319-51204-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Management of Surveillance Underwater Acoustic Networks -- Relative Localization for Small Wireless Sensor Networks -- Performance Study of the IEEE 802.15.6 Slotted Aloha Mechanism With Power Control in a Multiuser Environment -- New Selection Strategies of Actor’s Substitute in DARA for Connectivity Restoration in WSANs -- Asymmetric Multi-Way Ranging for Resource-Limited Nodes -- Comparison of RPL Routing Metrics on grids UAV and Vehicular Networks -- Communication and Coordination for Drone Networks 8 Intelligent Wireless AdHoc Routing Protocol and Controller for UAV Networks -- Theoretical Analysis of Obstruction’s influence on Data Dissemination in Vehicular Networks -- Performance Analysis for Traffic-aware Utility in Vehicular Ad Hoc Networks -- Investigation and Adaptation of Signal Propagation Models for a Mixed Outdoor-Indoor Scenario Using a Flying GSM Base Station Modelling and Analysis -- Optimizing Power Allocation in Wireless Networks: Are the Implicit Constraints Really Redundant? -- Towards Dynamic Capacity Management for the Masses -- Distance Distributions in Finite Ad Hoc Networks: Approaches, Applications, and Directions -- Towards More Realistic Network Simulations: Leveraging the System-Call Barrier -- 16 Resource Allocation for Relay-aided Cooperative Hospital Wireless Networks -- Improving the performance of challenged networks with controlled mobility -- SDN Coordination for CCN and FC Content Dissemination -- A Bandwidth Adaptation Scheme for Cloud Radio Access Networks -- Cooperative On-the-Fly Decision Making in Mobility-Controlled Multi Ferry Delay Tolerant Networks -- Multipath Routing Optimization with Interference Consideration in Wireless Ad hoc Network -- An Accurate Passive RFID Indoor Localization System based on SenseaTag and Zoning Algorithm Workshop on practical ad hoc network security and vulnerability -- Communication Links Vulnerability Model for Cyber Security Mitigation -- Entropy-Based Recommendation Trust Model for Machine to Machine Communications -- Reliability, Throughput and Latency Analysis of an Aerial Network -- Gender Assignment for Directional Full-Duplex FDD Nodes in a Multihop Wireless Network -- A Massive MIMO Panel Array at Ka-band with Flexible Patterns and Beam Steering Performance.
Record Nr. UNINA-9910254844103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad Hoc Networks : 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings / / edited by Nathalie Mitton, Melike Erol Kantarci, Antoine Gallais, Symeon Papavassiliou
Ad Hoc Networks : 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings / / edited by Nathalie Mitton, Melike Erol Kantarci, Antoine Gallais, Symeon Papavassiliou
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XI, 263 p. 110 illus. in color.)
Disciplina 004
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer communication systems
Special purpose computers
Computer security
Computer Communication Networks
Special Purpose and Application-Based Systems
Systems and Data Security
ISBN 3-319-25067-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Physical layer -- MAC and routing -- mobility in networks -- self-organization, virtualization and localization -- security and fault tolerance.
Record Nr. UNINA-9910299256903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad Hoc Networks : 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers / / edited by Natalie Mitton, Antoine Gallais, Melike Erol Kantarci, Symeon Papavassiliou
Ad Hoc Networks : 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers / / edited by Natalie Mitton, Antoine Gallais, Melike Erol Kantarci, Symeon Papavassiliou
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (IX, 266 p. 112 illus.)
Disciplina 004
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer science
Computer communication systems
Special purpose computers
Computer security
Computer Science, general
Computer Communication Networks
Special Purpose and Application-Based Systems
Systems and Data Security
ISBN 3-319-13329-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Interest-based forwarding for satisfying user preferences in vehicular networks -- Traffic-Aware Access-Points Deployment Strategies for VANETS -- A Social-based Approach for Message Dissemination in Vehicular Ad Hoc Networks -- Intelligent Transportation Systems - Maybe, But Where Are My Agents -- On the usefulness of information hiding techniques for wireless sensor networks security -- Evaluation of Malware Spreading in Wireless Multihop Networks with Churn -- Security and Privacy-preserving Mechanism for Aggregator based Vehicle-to-Grid Network -- An Improved TCP for Reduced Packet Delay in IEEE 802.11s-based Smart Grid AMI Networks -- A Cluster-based and On-demand routing algorithm for Large-Scale Multi-hop Wireless Sensor Networks -- Social OLSR: A social based routing algorithm for Mobile Ad Hoc Networks -- Improving Stability in QoS Routing for Ad-Hoc Networks -- Content Centricity in Constrained Cellular-Assisted D2D Communications -- Adaptive Transmit Power Adjustment Technique for ZigBee Network under Wi-Fi Interference -- Channel Switching Cost-Aware Resource Allocation for Multi-hop Cognitive Radio Networks with a Single Transceiver -- Connectivity Provisioning Using Cognitive Channel Selection in Vehicular Networks -- Using location services to autonomously drive flying mobile sinks in Wireless Sensor Networks -- Validation and Evaluation of the Chosen Path Planning Algorithm for Localization of Nodes Using an Unmanned Aerial Vehicle in Disaster Scenarios -- Structural Health Monitoring of Infrastructure using Wireless Sensor System -- A low-overhead localized target coverage algorithm in wireless sensor networks -- Connectivity restoration and amelioration in wireless ad-hoc networks: A practical solution.
Record Nr. UNINA-9910298966503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad Hoc Networks : 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers / / edited by Mostafa Hashem Sherif, Abdelhamid Mellouk, Jun Li, Paolo Bellavista
Ad Hoc Networks : 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers / / edited by Mostafa Hashem Sherif, Abdelhamid Mellouk, Jun Li, Paolo Bellavista
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 229 p.)
Disciplina 004.6
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer communication systems
Special purpose computers
Application software
Computer security
Computer Communication Networks
Special Purpose and Application-Based Systems
Computer Applications
Systems and Data Security
ISBN 3-319-04105-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto New Re-association Procedures for Reliable Handover in IEEE 802.15.4 Wireless Sensor Networks -- Mobile Data Collector Assignment and Scheduling for Minimizing Data Delay in Partitioned Wireless Sensor Networks -- HRTS: a Hierarchical Reactive Time Synchronization protocol for wireless sensor networks -- The Agony of Choice: Analysis of Routing Protocols in Chain Mesh Networks -- Traffic Modeling and Performance Evaluation in Vehicle to Infrastructure 802.11p Network Social-aware Opportunistic Routing Protocol based on User’s Interactions and Interests -- Node Wake-Up via OVSF-Coded Bloom Filters in Wireless Sensor Networks -- To Eavesdrop or Jam, That is the Question Using Cluster Analysis to Detect Attackers in Vehicular Delay Tolerant Networks -- An Efficient and Secure ARP for Large-scale IEEE 802.11s-based Smart Grid Networks.
Record Nr. UNINA-9910299056403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad Hoc Networks : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton
Ad Hoc Networks : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 366 p. 168 illus.)
Disciplina 005.82
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer communication systems
Computer security
Data encryption (Computer science)
Algorithms
Computer Communication Networks
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
ISBN 3-642-36958-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Substitution Networks: Performance Collapse Due to Overhead in Communication Times -- Handheld Analyzer of IEEE 802.15.4 PHY and MAC Frames -- Distributed Medium Access Control with Dynamic Altruism -- Providing Throughput Guarantees in IEEE 802.11 Wireless Networks -- Node Discovery and Replacement Using Mobile Robot -- Dynamic Tracking of Composite Events in Wireless Sensor Networks -- Localization in Wireless Sensor Networks by Cross Entropy Method -- Auction-Based Agent Negotiation in Cognitive Radio Ad Hoc Networks -- Asynchronous Rendezvous Protocol for Cognitive Radio Ad Hoc Networks -- DISON: A Self-organizing Network Management Framework for Wireless Sensor Networks -- A Flexible Deterministic Approach to Key Pre-distribution in Grid Based WSNs -- LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks -- Cross-Layer Interception Caching for MANETs -- Below Cross-Layer: An Alternative Approach to Service Discovery -- Modeling the Spontaneous Reaction of Mammalian Cells to External Stimuli -- Substitution Networks Based on Software Defined Networking -- A Modular Architecture for Reconfigurable Heterogeneous Networks -- Design Challenges and Solutions for Multi-channel Communications in Vehicular Ad Hoc NETworks -- Movement Speed Based Inter-probe Times for Neighbour Discovery.    .
Record Nr. UNINA-9910437573203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui