Technological advances have led to wide deployment and use of embedded systems in an increasing range of applications, from mobile phones to car, plane and spacecraft and from digital ids to military systems in the field. Many of these applications place significant security requirements and have le
Information Assurance and Computer Security, Volume 6 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science)
โ Scribed by J.P. Thomas and M. Essaaidi; Editors
- Year
- 2006
- Tongue
- English
- Leaves
- 216
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Today's society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the healthcare system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates new opportunities for the benefit of society. However, it also opens an avenue that can be exploited for illicit purposes. The stakes are high and many attacks go undetected or unreported. In addition to losses such as data or other forms of intellectual property, financial theft or the shut down of infrastructure, computer security attacks that target critical infrastructure such as nuclear power plants have the potential to cause human casualties on a massive and unprecedented scale. This book provides a discussion on a wide variety of viewpoints on some of the main challenges facing secure systems. This book will therefore be of major interest to all researchers in academia or industry with an interest in computer security. It is also relevant to graduate and advanced level undergraduate students who may want to explore the latest developments in the area of computer and information security.IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields. Some of the areas we publish in: -Biomedicine -Oncology -Artificial intelligence -Databases and information systems -Maritime engineering -Nanotechnology -Geoengineering -All aspects of physics -E-governance -E-commerce -The knowledge economy -Urban studies -Arms control -Understanding and responding to terrorism -Medical informatics -Computer Sciences
๐ SIMILAR VOLUMES
This volume aims to assess the state-of-the-art in the field of Quantum Communication and Security and to identify new research challenges. The papers in this book concentrate mainly on quantum cryptography (both technical and experimental aspects and pure theory), general problems of theoretical qu
The recent years have brought a number of advances in the development of infinite state verification, using techniques such as symbolic or parameterized representations, symmetry reductions, abstractions, constraint-based approaches, combinations of model checking and theorem proving. The active sta
Information fusion resulting from multi-source processing, often called multisensor data fusion when sensors are the main sources of information, is a relatively young (less than 20 years) technology domain. It provides techniques and methods for: Integrating data from multiple sources and using the
Today, the Internet is entering a new stage which will have a much stronger impact on the daily lives of all kinds of organizations. The next communication paradigm offers an improved access to mobility information, offering people and all organizations that deal with mobile devices the ability to a
Developments of the last few decades in digital communications have created a close link between mathematics and areas of computer science and electrical engineering. A collaboration between such areas now seems very natural, due to problems which require deep knowledge and expertise in each area. A