|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
SCIDIR_ocn731020034 |
003 |
OCoLC |
005 |
20231117044606.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
110616s2011 enka ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d OPELS
|d OCLCQ
|d OCLCF
|d OCLCO
|d YDXCP
|d OCLCQ
|d IAS
|d UAB
|d OCLCA
|d OCLCQ
|d CEF
|d LEAUB
|d OL$
|d UHL
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 9780123855114
|q (electronic bk.)
|
020 |
|
|
|a 012385511X
|q (electronic bk.)
|
020 |
|
|
|a 9780123855107
|q (electronic bk.)
|
020 |
|
|
|a 0123855101
|q (electronic bk.)
|
035 |
|
|
|a (OCoLC)731020034
|
050 |
|
4 |
|a QA76.9.A25
|b A38eb vol. 83
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
0 |
0 |
|a Advances in computers.
|n Volume 83 /
|c edited by Marvin V. Zelkowitz.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a London ;
|a Waltham, MA :
|b Academic Press,
|c 2011.
|
300 |
|
|
|a 1 online resource (xii, 355 pages) :
|b color illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and indexes.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field. In-depth surveys and tutorials on new computer technology Well-known authors and researchers in the field Extensive bibliographies with most chapters Many of the volumes are devoted to single themes or subfields of computer science.
|
505 |
0 |
|
|a Front Cover; Computers; Copyright; Contents; Preface; Chapter 1: The State of the Art in Identity Theft; 1. Introduction; 2. What Sets Identity Theft Apart from Other Crimes; 3. Statistical Data for Identity Theft and Associated Crimes; 4. The Genesis of the Problem; 5. How SSN Became the De Facto Primary Key for Most Databases; 6. The Ubiquitous Use of Fungible Credentials; 7. Phishing; 8. Modus Operandi; 9. Inadequate Credential Management Procedures; 10. Strategies for Defeating Identity Thieves; 11. Conclusion; References; Chapter 2: An Overview of Steganography; 1. Introduction
|
505 |
8 |
|
|a 2. Low-Tech Stego Methods3. Digital Technology Basics; 4. Steganography and Digital Carrier Files; 5. Detecting Steganography; 6. Steganography Detection Tools; 7. Summary and Conclusions; Appendix A. Additional Web Sites; Appendix B. Companion Downloads to this Chapter; References; Chapter 3: Captchas: An Artificial Intelligence Application to Web Security; 1. Introduction; 2. Motivation and Applications; 3. Types of CAPTCHAs; 4. Evaluation of CAPTCHAs; 5. Security and Attacks on CAPTCHAs; 6. Alternatives to CAPTCHAs; 7. Conclusions and Future Trends; References
|
505 |
8 |
|
|a Chapter 4: Advances in Video-Based Biometrics1. Introduction; 2. Video-Based Face Recognition; 3. Video-Based Identification Using Gait; 4. Conclusions; Acknowledments; References; Chapter 5: Action Research Can Swing the Balance in Experimental Software Engineering; 1. Introduction; 2. Action Research Overview; 3. The Use of Action Research in Software Engineering: A Preliminary Survey?; 4. Using Action Research in Software Engineering: An In Vivo Study; 5. Applying Action Research to Software Engineering; 6. Final Considerations; Acknowledments; References
|
505 |
8 |
|
|a Chapter 6: Functional and Nonfunctional Design Verification for Embedded Software Systems1. Introduction; 2. Background; 3. Instrumentation-based Verification; 4. Quality Attribute-Based Reasoning; 5. Integrated Functional and Nonfunctional Verification; 6. Tool Support; 7. Conclusion; References; Author Index; Subject Index; Contents of Volumes in This Series
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a World Wide Web
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|0 (DNLM)D016494
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
6 |
|a Web
|0 (CaQQLa)201-0266258
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures.
|0 (CaQQLa)201-0373949
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a World Wide Web
|x Security measures.
|2 fast
|0 (OCoLC)fst01181329
|
700 |
1 |
|
|a Zelkowitz, Marvin V.,
|d 1945-
|
776 |
0 |
8 |
|i Print version:
|t Security on the Web.
|d Academic Pr 2011
|z 9780123855107
|w (OCoLC)713189598
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780123855107
|z Texto completo
|