|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
SCIDIR_ocn961357073 |
003 |
OCoLC |
005 |
20231120112149.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
160705s2016 ne o 000 0 eng d |
040 |
|
|
|a NLE
|b eng
|e rda
|e pn
|c NLE
|d OCLCO
|d OCLCF
|d OCLCQ
|d GZM
|d D6H
|d OCLCA
|d OCLCQ
|d ESU
|d UHL
|d OPELS
|d UKMGB
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB697421
|2 bnb
|
016 |
7 |
|
|a 017926357
|2 Uk
|
020 |
|
|
|a 9780128051689
|q (ePub ebook)
|
020 |
|
|
|a 012805168X
|q (ePub ebook)
|
020 |
|
|
|z 9780128099193
|q (hbk.)
|
035 |
|
|
|a (OCoLC)961357073
|
050 |
|
4 |
|a QA76
|b .A383 2016
|
082 |
0 |
4 |
|a 005.12
|2 23
|
245 |
0 |
0 |
|a Advances in computers.
|n Volume 102 /
|c volume editor, Ali Hurson, Maziar Goudarzi.
|
264 |
|
1 |
|a Amsterdam :
|b Academic Press,
|c 2016.
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a Advances in Computers ;
|v Volume 102
|
500 |
|
|
|a 1. Advances in Software Engineering and Software Assurance>Dan Shoemaker, Carol Woody and Nancy R. Mead>2. Privacy Challenges and Goals in mHealth Systems>Farzana Rahman, Ivor D Addo and Sheikh Iqbal Ahamed, Ji-Jiang Yang and Qing Wang>3. A Survey of Data Cleansing Techniques for Cyber-Physical Critical Infrastructure Systems>Mark Woodard, Michael Wisely and Sahra Sedigh Sarvestani>4. Indexing and Querying Techniques for Moving Objects in Both Euclidean Space and Road Network>Lasanthi Heendaliya, Michael Wisely, Dan Lin, Sahra Sedigh Sarvestani and Ali Hurson.
|
588 |
0 |
|
|a CIP data; item not viewed.
|
520 |
8 |
|
|a Advances in Computers, an ongoing series since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references and continue to be of significant, lasting value in this rapidly expanding field.
|
505 |
0 |
|
|a Front Cover; Advances in Computers; Copyright; Contents; Preface; Chapter One: Advances in Software Engineering and Software Assurance; 1. Introduction; 2. Structured Programming: The Dawn of a New Era; 2.1. The GOTO Statement; 2.2. Structured Programming as a Solution; 2.3. IBM Training; 3. Language Support for Structured Programming; 3.1. FORTRAN; 3.2. ALGOL 60; 3.3. Intersection of Languages and a New Paradigm; 3.4. Software Engineering; 3.5. SE Education; 4. Computing Meets Reality: The Protection of Information in Computers; 4.1. The SAGE and SABRE Networks; 4.2. ARPANET
|
505 |
8 |
|
|a 4.3. Crime and Computers4.4. Strategies for Protecting Data; 4.5. Technology and Threats Converge; 4.6. Before the Internet; 4.7. Software Assurance; 5. Security Gets Serious: Societal Responses and the Morris Worm; 5.1. Computer Viruses; 5.2. Viruses ``In the Wild��; 5.3. The Morris Worm; 5.4. The Computer Fraud and Abuse Act; 5.5. Punishment Under the Law; 5.6. The CERT/CC; 6. Software as a Commodity and the Rise of the SE Best Practice Approach; 6.1. Personal Computers; 6.2. Application Software; 6.3. Flawed Software Development; 6.4. The Software Engineering Institute
|
505 |
8 |
|
|a 6.5. Master�s in Software Engineering6.6. Software Process; 6.7. WGSEET; 6.8. Undergraduate Software Development Degrees; 6.9. SE as a Profession; 7. The Rise of the Internet and the Advent of Formal Software and System Security Programs; 7.1. The Early Internet; 7.2. Computer Security and the Growing Internet; 7.3. Organized Incident Response; 7.4. Incident Management; 7.5. Malware; 7.6. The Need for Defect-Free Software; 7.6.1. Build Security In; 7.6.2. CWE Project; 7.7. Summary; 8. Cybersecurity Becomes a Societal Issue: Legal Frameworks; 8.1. The E-Government Act of 2002
|
505 |
8 |
|
|a 8.2. Federal Information Security Management Act (FISMA)8.2.1. Standards, Guidelines, and Associated Methods and Techniques; 8.2.2. Security Requirements; 8.3. Summary; 9. Complexity and Supply Chains: The Need for Broad-Scale Integration; 9.1. Integrated Complex Applications; 9.2. Component Complexity and Virtuality; 9.3. The Technology Supply Chain; 9.3.1. Risks to Critical Infrastructure; 9.3.2. Supply Chain Risk Management (SCRM); 9.4. Summary; 10. Where We Are Now; Acknowledgments; References; Chapter Two: Privacy Challenges and Goals in mHealth Systems; 1. Introduction
|
505 |
8 |
|
|a 2. Technologies Used in mHealth3. Major Privacy Challenges; 3.1. Privacy Challenges While Using Radio Frequency Identification in mHealth Application; 3.2. Privacy Challenges in Cell Phone-Based mHealth Services; 3.3. Privacy Challenges in Social Networking and Care Coordination Technologies; 4. Significance of Privacy in mHealth; 5. Solving Privacy Problems with Various Methods; 5.1. Encryption Methods; 5.2. Access Control Mechanisms; 5.3. Remote Data Checking Using Provable Data Possession; 5.4. Privacy-Preserving Data Integrity Checking; 5.5. Privacy-Preserving Public Auditability
|
650 |
|
0 |
|a Graphical user interfaces (Computer systems)
|
650 |
|
0 |
|a System analysis.
|
650 |
|
6 |
|a Interfaces graphiques (Informatique)
|0 (CaQQLa)201-0247943
|
650 |
|
6 |
|a Analyse de syst�emes.
|0 (CaQQLa)201-0007674
|
650 |
|
7 |
|a systems analysis.
|2 aat
|0 (CStmoGRI)aat300077662
|
650 |
|
7 |
|a Graphical user interfaces (Computer systems)
|2 fast
|0 (OCoLC)fst00946660
|
650 |
|
7 |
|a System analysis
|2 fast
|0 (OCoLC)fst01141385
|
700 |
1 |
|
|a Hurson, A. R.,
|e editor.
|
700 |
1 |
|
|a Goudarzi, Maziar,
|e editor.
|
776 |
0 |
8 |
|i Print version :
|z 9780128099193
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/bookseries/00652458/102
|z Texto completo
|