Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 16437 dokumen yang sesuai dengan query
cover
"Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.”
The second, updated edition of this handbook provides a sophisticated, cutting-edge resource on the space security portfolio and the associated technology, applications and programs to help fellow members of the global space community and other interested policy-making and academic audiences keep abreast of the current and future directions of this vital dimension of international space policy. Various dimensions of space security as well as space for security on Earth are described, covering space policy and the geopolitics of space, existing and planned applications and programs, as well as technological solutions.
This second edition covers the recent space and security developments that have taken place in Europe and worldwide over the last years, along with new challenges that must be addressed. At its conclusion, the book provides foreward-looking recommendations, especially in the area of space governance and transparency and confidence-building measures."
Switzerland: Springer Cham, 2019
e20503228
eBooks  Universitas Indonesia Library
cover
Tokyo: The National Institute for Defense Studies, 2016
358.8 NID s
Buku Teks  Universitas Indonesia Library
cover
"The Handbook of Space Law addresses the legal and regulatory aspects of activities in outer space and major space applications from a comprehensive and structured perspective. It fundamentally addresses the dichotomy between the state-oriented character of international space law and the increasing commercialization and privatization of space activities. The book focuses on international space law in the broadest sense of the word, not only including the UN-based space treaties and international customary (space) law, but also the many specialized regimes such as those applicable to the international satellite organizations, the International Space Station, the international trade and the security-sensitive aspects of space technology exports, the financing of space ventures and environmental concerns. The novelty of this holistic approach to space law notably includes the profound and ever-increasing commercialization of space activities and the attendant involvement of the private sector in such activities. This authoritative book thus presents a unique standard work of reference for anyone interested in studying or researching the legal and regulatory aspects of space activities and their major applications in depth. Offering the most comprehensive and holistic analysis on legal and regulatory aspects of space activities and major space applications to date this Handbook will be of particular interest to students in space law higher education, public international law, researchers (including JSD and PhD students) of space law and practitioners in the major sectors of space activities."
Cheltenham: Edward Elgar Publishing, 2015
341.47 HAN
Buku Teks SO  Universitas Indonesia Library
cover
Peeter Laud, editor
"This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware."
Berlin: [, Springer-Verlag], 2012
e20409702
eBooks  Universitas Indonesia Library
cover
"This is the first book which exploits concepts and tools of global nonlinear dynamics for bridging the gap between theoretical and practical stability of systems/structures, and for possibly enhancing the engineering design in macro-, micro- and nano-mechanics. Addressed topics include complementing theoretical and practical stability to achieve load carrying capacity; dynamical integrity for analyzing global dynamics, for interpreting/predicting experimental behavior, for getting hints towards engineering design; techniques for control of chaos; response of uncontrolled and controlled system/models in applied mechanics and structural dynamics by also considerung the effect of system imperfections; from relatively simple systems to multidimensional models representative of real world applications; potential and expected impact of global dynamics for engineering design."
Switzerland: Springer Cham, 2019
e20502750
eBooks  Universitas Indonesia Library
cover
"This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jaques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests"."
Berlin : Springer-Verlag, 2012
e20410614
eBooks  Universitas Indonesia Library
cover
Sebastian Mödersheim, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrücken, Germany, in March/April 2011, in association with ETAPS 2011. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. The papers feature topics including various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application."
Berlin: Springer-Verlag, 2012
e20408103
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.
The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security."
Berlin: [;Springer-Verlag, Springer-Verlag], 2012
e20408684
eBooks  Universitas Indonesia Library
cover
David Pointcheval, editor
"This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012.
The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices."
Berlin: Springer-Verlag, 2012
e20406359
eBooks  Universitas Indonesia Library
cover
"This book introduces fundamental concepts of cyber resilience, drawing expertise from academia, industry, and government. Resilience is defined as the ability to recover from or easily adjust to shocks and stresses. Unlike the concept of security - which is often and incorrectly conflated with resilience -- resilience refers to the system's ability to recover or regenerate its performance after an unexpected impact produces a degradation in its performance. A clear understanding of distinction between security, risk and resilience is important for developing appropriate management of cyber threats.
The book presents insightful discussion of the most current technical issues in cyber resilience, along with relevant methods and procedures. Practical aspects of current cyber resilience practices and techniques are described as they are now, and as they are likely to remain in the near term.
The bulk of the material is presented in the book in a way that is easily accessible to non-specialists. Logical, consistent, and continuous discourse covering all key topics relevant to the field will be of use as teaching material as well as source of emerging scholarship in the field. A typical chapter provides introductory, tutorial-like material, detailed examples, in-depth elaboration of a selected technical approach, and a concise summary of key ideas."
Switzerland: Springer Cham, 2019
e20501204
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>