Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment.
This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic approaches to transition these methods to practice equipping the user with extensive knowledge regarding the detected attack instead of a sole indicator of ongoing malicious events. It introduces a cyber-situational awareness framework that can be integrated into smart city operations to provide timely evidence-based insights regarding cyber incidents and respective system responses to assist decision-making.
This book targets researchers working in cybersecurity as well as advanced-level computer science students focused on this field. Cybersecurity operators will also find this book useful as a reference guide.
Bou-Harb , Ph.D., CISSP received a Ph.D. degree in computer science from Concordia University, Montreal, Canada. He was a visiting research scientist at Carnegie Mellon University (CMU), Pittsburgh, PA, USA, in 2015-2016. He is currently the Director of The Cyber Center For Security and Analytics at the University of Texas at San Antonio (UTSA) and an Associate Professor at the Department of Information Systems and Cyber Security. Dr. Bou-Harb specializes in operational cyber security and data science as applicable to the national security challenge. He is also a research scientist at the National Cyber Forensic and Training Alliance (NCFTA) of Canada. His current research interests are operational cyber security, attack detection and characterization, Internet measurements, and cyber security for critical infrastructure. Dr. Bou-Harb has authored more than 120 refereed publications in leading security and data science venues; he is the recipient of 5 best research paper awards, including the prestigious ACM's best digital forensics research paper. His research is funded by state and federal cyber security research grants valued at more than $8M.
Borko Furht, Ph.D. is Professor of Computer Science and Engineering at Florida Atlantic University and Director of the NSF Industry/University Cooperative Research Center for Advanced Knowledge Enablement. His areas of research include video and image processing and coding, Internet computing, and video applications in medicine, surveillance, and various industries. He published more than 300 referred papers, 45 books, and has about 60 patents and patent applications. He assured funding of about $25 million from government agencies such as NSF, Department of Navy, NASA, and NIH, and high-tech companies including Google, Motorola, Apple, IBM, LexisNexis, and others. He was Researcher of the Year at FAU in 2013 and 2019. He is a member of European Academy of Science. He has been an expert witness and consultant for a number of high-tech companies.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.