nav atļauts
nav atļauts
Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).
Nepieciešamā programmatūra
Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)
Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)
Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.
Network and Cyber-physical Systems Security.- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV).- Managing Secure Inter-slice Communication in 5G Network Slice Chains.- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes.- Security Enumerations for Cyber-Physical Systems.- Information Flow and Access Control.- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered.- Network Functions Virtualisation Access Control as a Service.- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems.- Information Flow Security Certification for SPARK Programs.- Privacy-preserving Computation.- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids.- Non-Interactive Private Decision Tree Evaluation.- Privacy-preserving Anomaly Detection using Synthetic Data.- Local Differentially Private Matrix Factorization with MoG for Recommendations.- Visualization and Analytics for Security.- Designing a Decision-Support Visualization for Live Digital Forensic Investigations.- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud.- PUA Detection Based on Bundle Installer Characteristics.- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool.- Spatial Systems and Crowdsourcing Security.- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding.- Crowdsourcing under Data Poisoning Attacks: A Comparative Study.- Self-Enhancing GPS-based Authentication Using Corresponding Address.- Secure Outsourcing and Privacy.- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation.- SGX-IR: Secure Information Retrieval with Trusted Processors.- Measuring Readability of Privacy Policies.