Angebote zu "Distributed" (8 Treffer)

Kategorien

Shops

Securing Digital Video
117,69 € *
ggf. zzgl. Versand

Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues, consumers want backwards compatibility, while they fear that content owners will spy on their viewing habits, and academics are afraid that DRM may be a barrier to knowledge sharing. DRM technologies have a poor reputation and are not yet trusted.This book describes the key aspects of content protection and DRM systems, the objective being to demystify the technology and techniques. In the first part of the book, the author builds the foundations, with sections that cover the rationale for protecting digital video content, video piracy, current toolboxes that employ cryptography, watermarking, tamper resistance, and rights expression languages, different ways to model video content protection, and DRM. In the second part, he describes the main existing deployed solutions, including video ecosystems, how video is protected in broadcasting, descriptions of DRM systems, such as Microsoft's DRM and Apple's FairPlay, techniques for protecting prerecorded content distributed using DVDs or Blu-ray, and future methods used to protect content within the home network. The final part of the book looks towards future research topics, and the key problem of interoperability.While the book focuses on protecting video content, the DRM principles and technologies described are also used to protect many other types of content, such as ebooks, documents and games. The book will be of value to industrial researchers and engineers developing related technologies, academics and students in information security, cryptography and media systems, and engaged consumers.

Anbieter: Dodax
Stand: 03.12.2020
Zum Angebot
QTFairUse
45,00 € *
ggf. zzgl. Versand

High Quality Content by WIKIPEDIA articles! QTFairUse is a software application first released in November 2003 by Jon Lech Johansen. It dumps the raw output of a QuickTime AAC stream to a file, which could bypass the digital rights management (DRM) algorithm called FairPlay used to encrypt music content of media files such as those distributed by the iTunes Store, Apple's online music store. Although these resulting raw AAC files were unplayable by most media players at the time of release, they represented the first attempt at circumventing Apple's encryption. These early versions of QTFairUse would save only the "raw" AAC (not contained in an MPEG-4 (MP4) container), but later incarnations properly supported full conversions. Released under the terms of the GNU General Public License, QTFairUse is free software. Functionally, the purpose of QTFairUse is to convert protected audio files (.m4p extension) purchased from Apple's iTunes Store into M4a files, without DRM.

Anbieter: Dodax
Stand: 03.12.2020
Zum Angebot
Distributed Digital Rights Management
68,00 € *
ggf. zzgl. Versand

In the digital world the management and protection of digital assets and the rights associated with them from unauthorized access, use and dissemination has for a long time been a matter of concern for many rights holders, and the protection of privacy a matter of concern for many users. A distributed Digital Rights Management (DRM) system is ideally suited to providing the necessary protection and management. This book investigates and describes a distributed DRM model, which fulfills this purpose. This analysis should be especially useful to professionals in e-Government, e-Business, e-Entertainment, e-Learning, and e-Health, to all stakeholders in the Intellectual Property (IP) value chain, content producers, owners, distributors, consumers, technology providers, etc., and to anyone who is planning to protect and manage rights in connection with any form of digital information in a free, balanced, equitable and commercially viable society.

Anbieter: Dodax
Stand: 03.12.2020
Zum Angebot
Dual Reciprocity Boundary Element Method
154,00 CHF *
ggf. zzgl. Versand

The boundary element method (BEM) is now a well-established numerical technique which provides an efficient alternative to the prevailing finite difference and finite element methods for the solution of a wide range of engineering problems. The main advantage of the BEM is its unique ability to provide a complete problem solution in terms of boundary values only, with substantial savings in computer time and data preparation effort. An initial restriction of the BEM was that the fundamental solution to the original partial differential equation was required in order to obtain an equivalent boundary in tegral equation. Another was that non-homogeneous terms accounting for effects such as distributed loads were included in the formulation by means of domain integrals, thus making the technique lose the attraction of its 'boundary-only' character. Many different approaches have been developed to overcome these problems. It is our opinion that the most successful so far is the dual reciprocity method (DRM), which is the subject matter of this book. The basic idea behind this approach is to employ a fundamental solution corresponding to a simpler equation and to treat the remaining terms, as well as other non-homogeneous terms in the original equation, through a procedure which involves a series expansion using global approximating functions and the application of reciprocity principles.

Anbieter: Orell Fuessli CH
Stand: 03.12.2020
Zum Angebot
Security Engineering
74,90 CHF *
ggf. zzgl. Versand

'Security engineering is different from any other kind of programming. . . . if you're even thinking of doing any security engineering, you need to read this book.' -- Bruce Schneier 'This is the best book on computer security. Buy it, but more importantly, read it and apply it in your work.' -- Gary McGraw This book created the discipline of security engineering The world has changed radically since the first edition was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy -- and as they specialize, they get better. New applications, from search to social networks to electronic voting machines, provide new targets. And terrorism has changed the world. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk about * Technical engineering basics -- cryptography, protocols, access controls, and distributed systems * Types of attack -- phishing, Web exploits, card fraud, hardware hacks, and electronic warfare * Specialized protection mechanisms -- what biometrics, seals, smartcards, alarms, and DRM do, and how they fail * Security economics -- why companies build insecure systems, why it's tough to manage security projects, and how to cope * Security psychology -- the privacy dilemma, what makes security too hard to use, and why deception will keep increasing * Policy -- why governments waste money on security, why societies are vulnerable to terrorism, and what to do about it

Anbieter: Orell Fuessli CH
Stand: 03.12.2020
Zum Angebot
Security Engineering
94,99 € *
ggf. zzgl. Versand

'Security engineering is different from any other kind of programming. . . . if you're even thinking of doing any security engineering, you need to read this book.' -- Bruce Schneier 'This is the best book on computer security. Buy it, but more importantly, read it and apply it in your work.' -- Gary McGraw This book created the discipline of security engineering The world has changed radically since the first edition was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy -- and as they specialize, they get better. New applications, from search to social networks to electronic voting machines, provide new targets. And terrorism has changed the world. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk about * Technical engineering basics -- cryptography, protocols, access controls, and distributed systems * Types of attack -- phishing, Web exploits, card fraud, hardware hacks, and electronic warfare * Specialized protection mechanisms -- what biometrics, seals, smartcards, alarms, and DRM do, and how they fail * Security economics -- why companies build insecure systems, why it's tough to manage security projects, and how to cope * Security psychology -- the privacy dilemma, what makes security too hard to use, and why deception will keep increasing * Policy -- why governments waste money on security, why societies are vulnerable to terrorism, and what to do about it

Anbieter: Thalia AT
Stand: 03.12.2020
Zum Angebot
Dual Reciprocity Boundary Element Method
82,99 € *
ggf. zzgl. Versand

The boundary element method (BEM) is now a well-established numerical technique which provides an efficient alternative to the prevailing finite difference and finite element methods for the solution of a wide range of engineering problems. The main advantage of the BEM is its unique ability to provide a complete problem solution in terms of boundary values only, with substantial savings in computer time and data preparation effort. An initial restriction of the BEM was that the fundamental solution to the original partial differential equation was required in order to obtain an equivalent boundary in tegral equation. Another was that non-homogeneous terms accounting for effects such as distributed loads were included in the formulation by means of domain integrals, thus making the technique lose the attraction of its 'boundary-only' character. Many different approaches have been developed to overcome these problems. It is our opinion that the most successful so far is the dual reciprocity method (DRM), which is the subject matter of this book. The basic idea behind this approach is to employ a fundamental solution corresponding to a simpler equation and to treat the remaining terms, as well as other non-homogeneous terms in the original equation, through a procedure which involves a series expansion using global approximating functions and the application of reciprocity principles.

Anbieter: Thalia AT
Stand: 03.12.2020
Zum Angebot