Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
4
result(s) for
"Martin, Ben R., editor"
Sort by:
The triple challenge for Europe : economic development, climate change, and governance
\"Europe is confronted by an intimidating triple challenge--economic stagnation, climate change, and a governance crisis. This book demonstrates how these three challenges are closely inter-related. A return to economic growth cannot come at the expense of greater risk of irreversible climate change. Instead, what is required is a reconceptualization of what is intended by 'economic development' and a fundamental transformation of the economy to a new 'green' trajectory, based on rapidly diminishing emission of greenhouse gases. This entails a much greater emphasis on innovation in all its forms--not just technological. Innovation policy must be placed at the very heart of industrial policy and indeed of economic policy more broadly. Other parts of the world are also facing varying forms of the triple challenge, and while the governance challenge may not be exactly the same as for Europe and the EU, Europe is uniquely placed to take the lead in addressing the triple challenge. While this may well entail certain costs in the short term, it will undoubtedly bring considerable benefits in the longer term.\"-- Provided by publisher.
Empirical Research for Software Security
by
Lotfi ben Othmane
,
Edgar Weippl
,
Martin Gilje Jaatun
in
Achim D. Brucker
,
Agile methods
,
Alexander Rind
2017,2018
Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.
1. Empirical Research on Security and Privacy by Design, Koen Yskout, Kim Wuyts, Dimitri Van Landuyt, Riccardo Scandariato, and Wouter Joosen 2. Guidelines for Systematic Mapping Studies in Security Engineering, Michael Felderer and Jeffrey C. Carver 3. An Introduction to Data Analytics for Software Security, Lotfi ben Othmane, Achim D. Brucker, Stanislav Dashevskyi, and Peter Tsalovski 4. Generating Software Security Knowledge Through Empirical Methods, Rene Noel, Santiago Matalonga, Gilberto Pedraza, Hernan Astudillo, and Eduardo B. Fernandez 5. Visual Analytics: Foundations and Experiences in Malware Analysis, Markus Wagner, Dominik Sacha, Alexander Rind, Fabian Fischer, Robert Luh, Sebastian Schrittwieser, Daniel A. Keim, and Wolfgang Aigner 6. Analysis of Metrics for Classification Accuracy in Intrusion Detection, Natalia Stakhanova and Alvaro A. Cardenas 7. The Building Security in Maturity Model as a Research Tool, Martin Gilje Jaatun 8. Agile Test Automation for Web Applications: A Security Perspective, Sandra Domenique Ringmann and Hanno Langweg 9. Benchmark for Empirical Evaluation of Web Application Anomaly Detectors, Robert Bronte, Hossain Shahriar, and Hisham Haddad 10. Threats to Validity in Empirical Software Security Research, Daniela S. Cruzes and Lotfi ben Othmane
Dr. Lotfi ben Othmane is on the faculty at the Department of Electrical and Computer Engineering, Iowa State University, USA. Previously, he was a Research Scientist and then Head of the Secure Software Engineering department at Fraunhofer SIT, Germany. Lotfi received his Ph.D. from Western Michigan University (WMU), USA, in 2010; the M.S. in computer science from University of Sherbrooke, Canada, in 2000; and the B.S in information systems from University of Sfax, Tunisia, in 1995. He works currently on software security, specifically on (1) the application of empirical methods to address software security challenges and (2) the impact of incremental development on the security of software.
Dr. Martin Gilje Jaatun is a Senior Scientist at SINTEF ICT, where he has been employed since 2004. He received his Sivilingeniør degree in Telematics from the Norwegian Institute of Technology (NTH) in 1992, and the Dr.Philos. degree from the University of Stavanger in 2015. Previous positions include scientist at the Norwegian Defence Research Establishment (FFI), and Senior Lecturer in information security at the Bodø Graduate School of Business. His research interests include software security, security in cloud computing, and security of critical information infrastructures. Dr. Jaatun is an associate editor of the International Journal of Secure Software engineering. He is vice chairman of the Cloud Computing Association (cloudcom.org), vice chairman of Cloud Security Alliance Norway, and a Senior Member of the IEEE.
Dr. Edgar Weippl is Research Director of SBA Research and Associate Professor at the Vienna University of Technology. His research focuses on applied concepts of IT security. He has published numerous articles in journals and more than 100 papers in peer-reviewed conferences. After graduating with a Ph.D. from the Vienna University of Technology, he worked in a research startup for two years. He then spent one year teaching as an assistant professor at Beloit College, WI. From 2002 to 2004, he was a Consultant for a Health Maintenance Organization (HMO) in New York and Albany, NY, and for Deutsche Bank, Frankfurt, Germany. In 2004 he joined the Vienna University of Technology and co-founded SBA Research. Dr. Weippl has edited a large number of special issues in journals such as Information Security Technical Report and Computers & Security.
Scientific dating in archaeology
2022
A variety of techniques have been developed to provide scientific chronologies of archaeological sites and material culture. These chronologies under-pin the narratives that are generated for prehistoric and other periods. The application of Bayesian statistical analysis to scientific chronologies has been hailed as 'a revolution in understanding', and has brought renewed emphasis onto how we generate scientific chronological data, how these data are applied into wider narratives, and the epistemological importance of these data. This volume will provide a timely review of the methods, applications and challenges of applying different scientific dating techniques to archaeological sites and material culture. It will then provide an introduction to Bayesian modelling, and highlight a series of considerations in the application of scientific dating techniques.
The Digital Public Domain
by
De Martin, Juan Carlos
,
Dulong de Rosnay, Melanie
in
communia
,
copyright
,
Copyright and electronic data processing
2012
Digital technology has made culture more accessible than ever before. Texts, audio, pictures and video can easily be produced, disseminated, used and remixed using devices that are increasingly user-friendly and affordable. However, along with this technological democratization comes a paradoxical flipside: the norms regulating culture's use —copyright and related rights —have become increasingly restrictive. This book brings together essays by academics, librarians, entrepreneurs, activists and policy makers, who were all part of the EU-funded Communia project. Together the authors argue that the Public Domain —that is, the informational works owned by all of us, be that literature, music, the output of scientific research, educational material or public sector information —is fundamental to a healthy society. The essays range from more theoretical papers on the history of copyright and the Public Domain, to practical examples and case studies of recent projects that have engaged with the principles of Open Access and Creative Commons licensing. The book is essential reading for anyone interested in the current debate about copyright and the Internet. It opens up discussion and offers practical solutions to the difficult question of the regulation of culture at the digital age. The free PDF edition of this title was made possible by generous funding received from the European Union (eContentplus framework project ECP-2006-PSI-610001).