Advanced security and network forensics: Introduction.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: Introduction. Edinburgh Napier University
1.1 Objectives
1.2 Introduction
1.3 Security Taxonomy
1.4 Threats
Hardware misuse
Environmental risks
External misuse
Pests
Active misuse
Passive misuse
Masquerading...
Introduction
Journal Article
Hussain, A. (2002)
Introduction. Control and Intelligent Systems, 30,
Introduction to Special Issue Number 1 of the international journal: Control and intelligent systems, nonlinear speech processing.
Introduction to the Special Issue on Intelligent Models for Security and Resilience in Cyber Physical Systems
Journal Article
Liu, Q., Liu, X., Grosu, R., & Yang, C. (2022)
Introduction to the Special Issue on Intelligent Models for Security and Resilience in Cyber Physical Systems. Computer Modeling in Engineering and Sciences, 131(1), 23-26. https://doi.org/10.32604/cmes.2022.020646
This article has no abstract.
Cognitive Computation: An introduction
Journal Article
Hussain, A. (2009)
Cognitive Computation: An introduction. Cognitive Computation, 1(1), 1-3. https://doi.org/10.1007/s12559-009-9013-z
Introduction to security and network forensics.
Book
Buchanan, W. J. (2011)
Introduction to security and network forensics. Auerbach Publications
Starting with an overview of general security concepts, it addresses hashing, digital certificates, enhanced software security, and network security. The text introduces the c...
Introduction: Managing Parliaments in the 21st Century
Book
Falconer, P., Smith, C. F., & Webster, W. (2000)
Introduction: Managing Parliaments in the 21st Century. In P. Falconer, C. Smith, & W. Webster (Eds.), Managing Parliaments in the 21st Century, 1-6. IOS Press
Introduction to the special section on pervasive adaptation
Journal Article
Zambonelli, F., & Paechter, B. (2012)
Introduction to the special section on pervasive adaptation. ACM transactions on autonomous and adaptive systems, 7(1), 1-2. https://doi.org/10.1145/2168260.2168269
Implementation of the Prometheus Taxonomic Model: a comparison of database models and query languages and an introduction to the Prometheus Object-Oriented Model.
Journal Article
Raguenaud, C., Pullan, M. R., Watson, M. F., Kennedy, J., Newman, M. F., & Barclay, P. J. (2002)
Implementation of the Prometheus Taxonomic Model: a comparison of database models and query languages and an introduction to the Prometheus Object-Oriented Model. Taxon, 51(1), 131-142. https://doi.org/10.2307/1554970
Types of databases commonly used for handling taxonomic data are compared. It is shown that none of the existing types of databases fully support the requirements of taxonomic...
Security and forensic computing: introduction to computer security.
Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: introduction to computer security
1 INTRODUCTION 14
1.1 The Industrial and the Information Age 14
1.2 CIA and AAA 15
1.3 Protecting against intruders 16
1.4 Users, systems and data 17
1.5 Security and Forensic...
Introduction: Dealing with Big Data-Lessons from Cognitive Computing
Journal Article
Abdullah, A., Hussain, A., & Khan, I. H. (2015)
Introduction: Dealing with Big Data-Lessons from Cognitive Computing. Cognitive Computation, 7(6), 635-636. https://doi.org/10.1007/s12559-015-9364-6
No abstract available