Cargando…

Advances in computers. Volume 83 /

Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal ar...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Zelkowitz, Marvin V., 1945-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London ; Waltham, MA : Academic Press, 2011.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 SCIDIR_ocn731020034
003 OCoLC
005 20231117044606.0
006 m o d
007 cr cnu---unuuu
008 110616s2011 enka ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d OPELS  |d OCLCQ  |d OCLCF  |d OCLCO  |d YDXCP  |d OCLCQ  |d IAS  |d UAB  |d OCLCA  |d OCLCQ  |d CEF  |d LEAUB  |d OL$  |d UHL  |d OCLCO  |d OCLCQ 
020 |a 9780123855114  |q (electronic bk.) 
020 |a 012385511X  |q (electronic bk.) 
020 |a 9780123855107  |q (electronic bk.) 
020 |a 0123855101  |q (electronic bk.) 
035 |a (OCoLC)731020034 
050 4 |a QA76.9.A25  |b A38eb vol. 83 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Advances in computers.  |n Volume 83 /  |c edited by Marvin V. Zelkowitz. 
250 |a 1st ed. 
260 |a London ;  |a Waltham, MA :  |b Academic Press,  |c 2011. 
300 |a 1 online resource (xii, 355 pages) :  |b color illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and indexes. 
588 0 |a Print version record. 
520 |a Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field. In-depth surveys and tutorials on new computer technology Well-known authors and researchers in the field Extensive bibliographies with most chapters Many of the volumes are devoted to single themes or subfields of computer science. 
505 0 |a Front Cover; Computers; Copyright; Contents; Preface; Chapter 1: The State of the Art in Identity Theft; 1. Introduction; 2. What Sets Identity Theft Apart from Other Crimes; 3. Statistical Data for Identity Theft and Associated Crimes; 4. The Genesis of the Problem; 5. How SSN Became the De Facto Primary Key for Most Databases; 6. The Ubiquitous Use of Fungible Credentials; 7. Phishing; 8. Modus Operandi; 9. Inadequate Credential Management Procedures; 10. Strategies for Defeating Identity Thieves; 11. Conclusion; References; Chapter 2: An Overview of Steganography; 1. Introduction 
505 8 |a 2. Low-Tech Stego Methods3. Digital Technology Basics; 4. Steganography and Digital Carrier Files; 5. Detecting Steganography; 6. Steganography Detection Tools; 7. Summary and Conclusions; Appendix A. Additional Web Sites; Appendix B. Companion Downloads to this Chapter; References; Chapter 3: Captchas: An Artificial Intelligence Application to Web Security; 1. Introduction; 2. Motivation and Applications; 3. Types of CAPTCHAs; 4. Evaluation of CAPTCHAs; 5. Security and Attacks on CAPTCHAs; 6. Alternatives to CAPTCHAs; 7. Conclusions and Future Trends; References 
505 8 |a Chapter 4: Advances in Video-Based Biometrics1. Introduction; 2. Video-Based Face Recognition; 3. Video-Based Identification Using Gait; 4. Conclusions; Acknowledments; References; Chapter 5: Action Research Can Swing the Balance in Experimental Software Engineering; 1. Introduction; 2. Action Research Overview; 3. The Use of Action Research in Software Engineering: A Preliminary Survey?; 4. Using Action Research in Software Engineering: An In Vivo Study; 5. Applying Action Research to Software Engineering; 6. Final Considerations; Acknowledments; References 
505 8 |a Chapter 6: Functional and Nonfunctional Design Verification for Embedded Software Systems1. Introduction; 2. Background; 3. Instrumentation-based Verification; 4. Quality Attribute-Based Reasoning; 5. Integrated Functional and Nonfunctional Verification; 6. Tool Support; 7. Conclusion; References; Author Index; Subject Index; Contents of Volumes in This Series 
650 0 |a Computer security. 
650 0 |a World Wide Web  |x Security measures. 
650 2 |a Computer Security  |0 (DNLM)D016494 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 6 |a Web  |0 (CaQQLa)201-0266258  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures.  |0 (CaQQLa)201-0373949 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a World Wide Web  |x Security measures.  |2 fast  |0 (OCoLC)fst01181329 
700 1 |a Zelkowitz, Marvin V.,  |d 1945- 
776 0 8 |i Print version:  |t Security on the Web.  |d Academic Pr 2011  |z 9780123855107  |w (OCoLC)713189598 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780123855107  |z Texto completo