Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 5
- Computer networks 3
- Security measures 3
- Data protection 2
- Handbooks, manuals, etc 2
- Management 2
- Prevention 2
- COMPUTERS / Security / General 1
- Civil rights 1
- Crime prevention 1
- Cyberterrorism 1
- Information technology 1
- Internal security 1
- Mobile communication systems 1
- Mobile computing 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Technology 1
- Violence 1
- computer security 1
-
1
Computer Security
Published 2002-12-01“… This guide is intended to present a selected list of sites that cover the basic issues of computer security and which provide useful information for the non-expert (librarian, undergraduate student, office manager, etc.) who wants to learn more about this increasingly important subject. …”
Get full text
Article -
2
CLOUD COMPUTING SECURITY
Published 2016-05-01Subjects: “…cloud computing; security; public services; composite services; best practices;…”
Get full text
Article -
3
Computer Security Lab Manual /
Published 2006Subjects: “…Computer security Management Handbooks, manuals, etc. 3242…”
View in OPAC
Book -
4
Computer security lab manual /
Subjects: “…Computer security Management Handbooks, manuals, etc. 10577…”
Table of contents only
Contributor biographical information
View in OPAC
Book -
5
Computer Security Lab Manual/
Published 2006Subjects: “…computer security 11095…”
View in OPAC
Book -
6
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
7
Virtualization Security, Key Issues of Public Cloud Computing Security
Published 2015-12-01Get full text
Article -
8
Virtual Cloud Laboratories in Training of Specialists of the Direction “Computer Security”
Published 2015-12-01Get full text
Article -
9
Cloud Computing Security Construction Analysis of China Telecom Business Platform
Published 2013-04-01Get full text
Article -
10
HOMOMORPHIC ENCRYPTION: CLOUD COMPUTING SECURITY AND OTHER APPLICATIONS (A SURVEY)
Published 2016-09-01Get full text
Article -
11
Analytical skills of computer security students in the structure of analytical thinking readiness
Published 2015-11-01Subjects: Get full text
Article -
12
Application of interactive effect evaluation model in improving computer security management and teaching management
Published 2025-02-01Subjects: Get full text
Article -
13
IT SECURITY MANAGEMENT IN SMALL AND MEDIUM ENTERPRISES
Published 2017-12-01Subjects: “…computer security…”
Get full text
Article -
14
Applied network security monitoring : collection, detection, and analysis /
Published 2014Subjects: “…Computer security.…”
View in OPAC
Book -
15
-
16
-
17
Evaluation framework for deepfake speech detection: a comparative study of state-of-the-art deepfake speech detectors
Published 2025-08-01Subjects: Get full text
Article -
18
Analysis of the implications of digital voting through neutrosophic Delphi modeling
Published 2024-11-01Subjects: Get full text
Article -
19
Elastic Shifts: I/O Sequence Patterns of Ransomware and Detection Evasion
Published 2025-01-01Subjects: “…Computer security…”
Get full text
Article -
20
Cyber security and IT infrastructure protection /
Published 2014Subjects: “…Computer security.…”
View in OPAC
Book