Udvidet returret til d. 31. januar 2025

Informationsarkitektur

Her finder du spændende bøger om Informationsarkitektur. Nedenfor er et flot udvalg af over 116 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Jeremy Kubica
    374,95 kr.

    Learn how and when to use the right data structures in any situation, strengthening your computational thinking, problem-solving, and programming skills in the process.This accessible and entertaining book provides an in-depth introduction to computational thinking through the lens of data structures — a critical component in any programming endeavor. You’ll learn how to work with more than 15 key data structures, from stacks, queues, and caches to bloom filters, skip lists, and graphs. You’ll also master linked lists by virtually standing in line at a cafe, hash tables by cataloging the history of the summer Olympics, and Quadtrees by neatly organizing your kitchen cabinets, all while becoming familiar with basic computer science concepts, like recursion and running time analysis.

  • af Christian Baun
    229,95 kr.

    Speicherverwaltung, Hardwareverwaltung, Prozessadministration und Interprozesskommunikation sind zentrale Aufgaben von Betriebssystemen. Die Konzepte und Prinzipien, auf denen klassische und moderne Betriebssysteme basieren, erläutert der Autor anhand von einschlägigen Aufgabenstellungen und Lösungen. Das Werk gibt damit eine verständliche Einführung in die Architektur von Betriebssystemen und eignet sich deshalb auch für die Lehre im Bachelorstudium.

  • af Girish Kumar Gupta & Mohammad Hassan Baig
    1.612,95 kr.

    In Silico Chemistry and Biology: Current and Future Prospects provides a compact overview on recent advances in this highly dynamic branch of chemistry. Various methods of protein modelling and computer-assisted drug design are presented, including fragment- and ligand-based approaches. Many successful practical applications of these techniques are demonstrated. The authors also look to the future and describe the main challenges of the field.

  • af Frank Rubin
    515,95 kr.

  • af Aleksandra Sowa
    616,95 kr.

    Auf Grundlage des risikoorientierten Prüfungsansatzes zeigt dieses Buch, wie effektive Prüfungsaktivitäten in einem komplexen Prüfungsumfeld mit besonderer Berücksichtigung aktueller Topthemen wie Datenschutz, Cybersecurity, Penetrationstests und Investigationen bei einer wachsenden Anzahl unternehmensinterner Ermittlungen durchgeführt werden können. Neuartige Instrumente und Methoden für die Arbeit der IT-Revision werden aufgezeigt und neue Ansätze diskutiert. In der zweiten, überarbeiteten und aktualisierten Auflage erfahren die Meldepflichten nach DSGVO, ITSiG bzw. NIS-Richtlinie eine besondere Betrachtung. Das Buch hilft, die Arbeitsweisen der Revision systematisch zu erfassen sowie Prüfungen zu planen und durchzuführen. Dabei bietet es sowohl fertige Lösungen als auch "Hilfe zur Selbsthilfe" an. Der Inhalt¿           Audit, Continuous Audit, Monitoring und Revision¿           Methodik der IT-Prüfung¿           IT-Revision bei Betrugsaufdeckung, Investigation und Prüfung doloser Handlungen  ¿           Penetrationstest als Instrument der Internen Revision¿           Meldepflichten nach DSGVO, ITSiG bzw. NIS-RL: Vorgaben und Prüfung¿           Prüfung kartellrechtlicher Compliance durch Mock Dawn Raid als Prüfungsmethode der IT-Revision Die Zielgruppen¿           Prüfer, Revisoren, IT-Auditoren, Datenschutzauditoren¿           IT-Compliance Manager, Risikomanager, (Information) Security Officer, interne Ermittler, Investigatoren¿           Datenschutzverantwortliche, Datenschutzbeauftragte¿           Studierende in Masterstudiengängen (z. B. Audit & Assurance, Informatik, Wirtschaftsinformatik)  Die AutorenDr. Aleksandra Sowa leitete zusammen mit dem deutschen Kryptologen Hans Dobbertin das Horst Görtz Institut für Sicherheit in der Informationstechnik, ist Autorin diverser Bücher und Fachpublikationen, zertifizierte Datenschutzbeauftragte, Datenschutzauditorin und IT-Compliance-Managerin (ITCM).Peter Duscha ist Diplom-Mathematiker mit über 15 Jahren Erfahrung in Interner Revision, u. a. in der Finanzbranche. Er ist akkreditierter Quality Assessor des DIIR und verfügt über mehrere Zertifizierungen im Bereich Interne Revision (CIA, CCSA, CRMA).Sebastian Schreiber ist Diplom-Informatiker und gründete 1998 in Tübingen das IT-Sicherheitsunternehmen SySS GmbH - heute deutscher Marktführer für Penetrationstests. Er ist als Experte für digitale Sicherheit in den Medien präsent und sitzt im Beirat der Zeitschrift "Datenschutz und Datensicherheit".

  • af Christian Rudder
    212,95 kr.

    A New York Times BestsellerAn audacious, irreverent investigation of human behavior-and a first look at a revolution in the making Our personal data has been used to spy on us, hire and fire us, and sell us stuff we don't need. In Dataclysm, Christian Rudder uses it to show us who we truly are. For centuries, we've relied on polling or small-scale lab experiments to study human behavior. Today, a new approach is possible. As we live more of our lives online, researchers can finally observe us directly, in vast numbers, and without filters. Data scientists have become the new demographers. In this daring and original book, Rudder explains how Facebook "likes" can predict, with surprising accuracy, a person's sexual orientation and even intelligence; how attractive women receive exponentially more interview requests; and why you must have haters to be hot. He charts the rise and fall of America's most reviled word through Google Search and examines the new dynamics of collaborative rage on Twitter. He shows how people express themselves, both privately and publicly. What is the least Asian thing you can say? Do people bathe more in Vermont or New Jersey? What do black women think about Simon & Garfunkel? (Hint: they don't think about Simon & Garfunkel.) Rudder also traces human migration over time, showing how groups of people move from certain small towns to the same big cities across the globe. And he grapples with the challenge of maintaining privacy in a world where these explorations are possible. Visually arresting and full of wit and insight, Dataclysm is a new way of seeing ourselves-a brilliant alchemy, in which math is made human and numbers become the narrative of our time.

  • af Christian Schlegel, Yan Zhang, Alexey Vinel, mfl.
    713,95 kr.

    This book constitutes the refereed proceedings of the 4th International Workshop on Multiple Access Communications, MACOM 2011, held in Trento, Italy, in September 2011. The 21 full papers presented were carefully reviewed and selected from more than 40 submissions. They are divided in topical sections on cognitive radio; MAC protocols; communications theory; special session on MAC protocols for WSNs; system analysis and scheduling; and queuing systems.

  • af Johannes Buchmann, Marc Fischlin & Mark Manulis
    608,95 kr.

    This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

  • af Alex Galis, Ana García, John Domingue, mfl.
    619,95 kr.

    Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures.

  • af Hao Yin, Robert Bestak, Lukas Kencl, mfl.
    583,95 - 584,95 kr.

  • af Burkhard Stiller & Antonis M. Hadjiantonis
    615,95 kr.

    This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics. Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed: - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms.

  • af Andreas Uhl, Bart de Decker, Jorn Lapon & mfl.
    569,95 kr.

    This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26 revised papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, biometrics, multimedia security, network security and authentication.

  • af Franck Petit, Xavier Defago & Vincent Villain
    585,95 kr.

    This book constitutes the proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2011, held in Grenoble, France, in October 2011. The 29 papers presented were carefully reviewed and selected from 79 submissions. They cover the following areas: ad-hoc, sensor, and peer-to-peer networks; safety and verification; security; self-organizing and autonomic systems; and self-stabilization.

  • af Robin Sommer, Davide Balzarotti & Gregor Maier
    581,95 - 590,95 kr.

  • af Laurence T. Yang, Yan Wang, Jose M. Alcaraz Calero, mfl.
    569,95 kr.

    This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011. The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications.

  • af Jan Camenisch & Costas Lambrinoudakis
    565,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.

  • af Udaya Parampalli & Philip Hawkes
    586,95 kr.

    This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

  • af Matthew Wright & Simone Fischer-Hübner
    570,95 - 574,95 kr.

  • af Antoine Joux
    582,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.

  • af Javier Lopez & Gene Tsudik
    593,95 kr.

    This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

  • af Orit Hazzan, Alberto Sillitti, Emily Bache & mfl.
    575,95 - 582,95 kr.

  • af Yuval Shavitt, Steve Uhlig & Jordi Domingo-Pascual
    563,95 kr.

    This book constitutes the proceedings of the Third International Workshop on Traffic Monitoring and Analysis, TMA 2011, held in Vienna, Austria, on April 27, 2011 - co-located with EW 2011, the 17th European Wireless Conference. The workshop is an initiative from the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks". The 10 revised full papers and 6 poster papers presented together with 4 short papers were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on traffic analysis, applications and privacy, traffic classification, and a poster session.

  • af Aris Gkoulalas-Divanis, Vassilios S. Verykios, Christos Dimitrakakis, mfl.
    558,95 kr.

    This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010.The 11 revised full papers presented were carefully reviewed and selected from 21 submissions. The papers range from data privacy to security applications, focusing on detecting malicious behavior incomputer systems.

  • af Jan Pries-Heje, Winfried Lamersdorf, Michael Rosemann & mfl.
    577,95 kr.

    Pries-Heje Roskilde University, Denmark

  • af Fabio Martinelli, Pierpaolo Degano & Joshua Guttman
    569,95 - 575,95 kr.

  • af D. Boneh
    1.128,95 kr.

    Crypto 2003, the 23rd Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The conference received 169 submissions, of which the program committee selected 34 for presentation. These proceedings contain the revised versions of the 34 submissions that were presented at the conference. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. Submissions to the conference represent cutti- edge research in the cryptographic community worldwide and cover all areas of cryptography. Many high-quality works could not be accepted. These works will surely be published elsewhere. The conference program included two invited lectures. Moni Naor spoke on cryptographic assumptions and challenges. Hugo Krawczyk spoke on the 'SI- and-MAc'approachtoauthenticatedDi?e-HellmananditsuseintheIKEpro- cols. The conference program also included the traditional rump session, chaired by Stuart Haber, featuring short, informal talks on late-breaking research news. Assembling the conference program requires the help of many many people. To all those who pitched in, I am forever in your debt. I would like to ?rst thank the many researchers from all over the world who submitted their work to this conference. Without them, Crypto could not exist. I thank Greg Rose, the general chair, for shielding me from innumerable logistical headaches, and showing great generosity in supporting my e?orts.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.