You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and vulnerabilities, as well as relevant risk management methodologies, by focusing on initiatives and efforts that attempt to deal with the risks and vulnerabilities of port Critical Information Infrastructures (CII) ecosystems. Modern commercial shipping ports are highly dependent on the operation of complex, dynamic ICT systems and ICT-based maritime supply chains, making these central points in the maritime supply chain vulnerable to cybersecurity threats. - Identifies barriers and gaps in existing port and supply chain security standards, policies, legislation and regulatory frameworks - Identifies port threat scenarios and analyzes cascading effects in their supply chains - Analyzes risk assessment methodologies and tools, identifying their open problems when applied to a port's CIIs
These proceedings consist of 30 selected research papers based on results presented at the 10th Balkan Conference & 1st International Symposium on Operational Research (BALCOR 2011) held in Thessaloniki, Greece, September 22-24, 2011. BALCOR is an established biennial conference attended by a large number of faculty, researchers and students from the Balkan countries but also from other European and Mediterranean countries as well. Over the past decade, the BALCOR conference has facilitated the exchange of scientific and technical information on the subject of Operations Research and related fields such as Mathematical Programming, Game Theory, Multiple Criteria Decision Analysis, Information Systems, Data Mining and more, in order to promote international scientific cooperation. The carefully selected and refereed papers present important recent developments and modern applications and will serve as excellent reference for students, researchers and practitioners in these disciplines.
The volume deals with sustainability transitions which are transformations of major socio-technical systems of provision and use in areas such as energy, water, mobility, and food, towards more sustainable ways of production and consumption. The book provides insights of World Conference on Smart Trends in Systems, Security and Sustainability (WS4 2017) which is divided into different sections such as Smart IT Infrastructure for Sustainable Society; Smart Management prospective for Sustainable Society; Smart Secure Systems for Next Generation Technologies; Smart Trends for Computational Graphics and Image Modelling; and Smart Trends for Biomedical and Health Informatics. The book volume contains 31 high-quality papers presented at WS4 2017.
This book introduces readers to some of the most significant advances in core computer science-based technologies. At the dawn of the 4th Industrial Revolution, the field of computer science-based technologies is growing continuously and rapidly, and is developing both in itself and in terms of its applications in many other disciplines. Written by leading experts and consisting of 18 chapters, the book is divided into seven parts: (1) Computer Science-based Technologies in Education, (2) Computer Science-based Technologies in Risk Assessment and Readiness, (3) Computer Science-based Technologies in IoT, Blockchains and Electronic Money, (4) Computer Science-based Technologies in Mobile Comp...
Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict, etc., and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike....
This book constitutes the thoroughly refereed post-conference proceedings of the 11th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2011, held in Kaunas, Lithuania, in October 2011. The 25 revised papers presented were carefully reviewed and selected from numerous submissions. They are organized in the following topical sections: e-government and e-governance, e-services, digital goods and products, e-business process modeling and re-engineering, innovative e-business models and implementation, e-health and e-education, and innovative e-business models.
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at SOCO 2013, CISIS 2013 and ICEUTE 2013, all conferences held in the beautiful and historic city of Salamanca (Spain), in September 2013. Soft computing represents a collection or set of computational techniques in machine learning, computer science and some engineering disciplines, which investigate, simulate, and analyze very complex issues and phenomena. After a through peer-review process, the 8th SOCO 2013 International Program Committee selected 40 papers which are published in these conference proceedings, and represents an acceptance rate of 41%. In this relevant edition a special emphasis w...
It is becoming increasingly important for telecom operators to be able to provide service delivery platforms (SDP) quickly and efficiently in order to improve the time-to-revenue of value-added services. Presenting a rapid architecture solution to meet this challenge, Service Delivery Platforms: Developing and Deploying Converged Multimedia Services supplies a comprehensive overview of the technical aspects of service and content delivery platforms. Leading experts walk you through the entire user experience—including requirements for the user terminal, SDP, networks, and support systems. You’ll start by examining content and media in modern networks. Evaluating basic functions and feasi...
As the field of information technology continues to grow and expand, it impacts more and more organizations worldwide. The leaders within these organizations are challenged on a continuous basis to develop and implement programs that successfully apply information technology applications. This is a collection of unique perspectives on the issues surrounding IT in organizations and the ways in which these issues are addressed. This valuable book is a compilation of the latest research in the area of IT utilization and management.
None