close
1.

電子ブック

EB
Colin Walls
出版情報: Elsevier ScienceDirect Books , Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
What Makes an Embedded Application Tick? / 1:
Memory in Embedded Systems / 2:
Memory Architectures / 3:
How Software Influences Hardware Design / 4:
Migrating your Software to a New Processor Architecture / 5:
Embedded Software for Transportation Applications / 6:
How to Choose a CPU for Your SoC Design / 7:
An Introduction to USB Software / 8:
Towards USB 3.0 / 9:
What Makes an Embedded Application Tick? / 1:
Memory in Embedded Systems / 2:
Memory Architectures / 3:
2.

電子ブック

EB
Magnus Olsson, Catherine Mulligan, Magnus Olsson
出版情報: Elsevier ScienceDirect Books , Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
List of Abbreviations
Introduction - Background and Vision of EPC / Part I:
Mobile Broadband and the Core Network Evolution / Chapter 1:
A Global Standard / 1.1:
Origins of the Evolved Packet Core / 1.2:
3GPP Radio Access Technologies / 1.2.1:
3GPP2 Radio Access Technologies / 1.2.2:
SAE - Building Bridges Between Different Networks / 1.2.3:
A Shifting Value Chain / 1.3:
Terminology Used in This Book / 1.4:
Overview of EPS / Part II:
Architecture Overview / Chapter 2:
EPS Architecture / 2.1:
Basic LP Connectivity Over LTE Access / 2.1.1:
Adding More Advanced Functionality for LTE Access / 2.1.2:
Interworking Between LTE and GSM/GPRS or WCDMA/HSPA / 2.1.3:
Support for 3GPP Voice Services / 2.1.4:
Interworking Between LTE and CDMA Networks / 2.1.5:
Interworking Between 3GPP Access Technologies and Non-3GPP Access Technologies / 2.1.6:
Support for Broadcasting in Cellular Networks / 2.1.7:
Positioning Services / 2.1.8:
Optimizations for Small Cells and Local Access / 2.1.9:
Miscellaneous Features / 2.1.10:
Summary of the Architecture Overview / 2.1.11:
Mobile Network Radio Technologies / 2.2:
Overview of Radio Networks for Mobile Services / 2.2.1:
Radio Network Functionality / 2.2.2:
GSM / 2.2.3:
WCDMA / 2.2.4:
LTE / 2.2.5:
EPS Deployment Scenarios and Operator Cases / Chapter 3:
Scenario 1: Existing GSM/GPRS and/or WCDMA/HSPA Operators Deploying LTE/EPC / 3.1:
First Phase - Initial EPC Deployment / 3.1.1:
Second Phase - Integration with Existing Packet Core / 3.1.2:
Third Phase - Further Optimizations Towards the Common Core / 3.1.3:
Scenario 2: Existing CDMA Operators Deploying LTE/EPC / 3.2:
Scenario 3: New Operators Deploying LTE/EPC / 3.3:
Data Services in EPS / Chapter 4:
Messaging Services / 4.1:
Machine Type Communication / 4.2:
Industrial and Corporate Uses / 4.2.1:
Societal - M2M and Sustainable Development / 4.2.2:
Voice Services in EPS / Chapter 5:
Realization of Voice Over LTE / 5.1:
Voice Services Using IMS Technology / 5.2:
Single-Radio Voice Call Continuity (SRVCC) / 5.3:
Circuit-Switched Fallback / 5.4:
Comparing MMTel/SRVCC and CSFB / 5.5:
IMS Emergency Calls and Priority Services / 5.6:
Key Concepts and Services / Part III:
Session Management and Mobility / Chapter 6:
IP Connectivity and Session Management / 6.1:
The LP Connection / 6.1.1:
Session Management, Bearers, and QoS Aspects / 6.2:
General / 6.2.1:
The EPS Bearer for E-UTRAN Access / 6.2.2:
Session Management for EPS and GERAN/UTRAN Accesses / 6.2.3:
Session Management for Other Accesses / 6.2.4:
Subscriber Identifiers and Corresponding Legacy Identities / 6.3:
Permanent Subscriber Identifiers / 6.3.1:
Temporary Subscriber Identifiers / 6.3.2:
Relation to Subscription Identifiers in 2G/3G / 6.3.3:
Mobility Principles / 6.4:
Mobility within 3GPP Family of Accesses / 6.4.1:
Idle-Mode Signaling Reduction (ISR) / 6.4.3:
Closed Subscriber Group / 6.4.4:
Mobility Between E-UTRAN and HRPD / 6.4.5:
Generic Mobility Between 3GPP and Non-3GPP Accesses / 6.4.6:
Access Network Discovery and Selection / 6.4.7:
Interworking with Managed WLAN Networks / 6.5:
Pooling, Overload Protection, and Congestion Control / 6.6:
Security / Chapter 7:
Introduction / 7.1:
Security Services / 7.2:
Security Domains / 7.2.1:
Network Access Security / 7.3:
Access Security in E-UTRAN / 7.3.1:
Interworking with GERAN/UTRAN / 7.3.2:
Special Consideration for IMS Emergency Calls / 7.3.3:
Trusted and Untrusted Non-3GPP Accesses / 7.3.4:
Access Security in Trusted Non-3GPP Accesses / 7.3.5:
Access Security in Untrusted Non-3GPP Access / 7.3.6:
Special Considerations for Host-Based Mobility DSMIPv6 / 7.3.7:
Network Domain Security / 7.4:
User Domain Security / 7.5:
Security Aspects of Home eNBs and Home NBs / 7.6:
H(e)NB Security Architecture / 7.6.1:
Closed Subscriber Groups / 7.6.2:
Device Authentication / 7.6.3:
Hosting Party Authentication / 7.6.4:
Backhaul Link Security / 7.6.5:
Location Verification / 7.6.6:
Lawful Intercept / 7.7:
Quality of Service, Charging, and Policy Control / Chapter 8:
Quality of Service / 8.1:
QoS in E-UTRAN / 8.1.1:
QoS Aspects When Interworking with Other Accesses / 8.1.2:
Policy and Charging Control / 8.2:
The PCC Architecture / 8.2.1:
Basic PCC Concepts / 8.2.2:
Network vs. Terminal-Initiated QoS Control / 8.2.3:
PCC and Roaming / 8.2.4:
Additional PCC Features Developed Since Release 8 / 8.2.5:
PCC Support for Fixed Broadband Access / 8.2.6:
Charging / 8.3:
Selection Functions / Chapter 9:
Architecture Overview for Selection Functions / 9.1:
Selection of MME, SGSN, Serving GW, and PDN GW / 9.2:
Selection Procedure at a Glance / 9.2.1:
Use of DNS Infrastructure / 9.2.2:
MME Selection / 9.2.3:
SGSN Selection Function for EPS / 9.2.4:
GW Selection Overview / 9.2.5:
PDN GW Selection Function / 9.2.6:
Serving GW Selection Function / 9.2.7:
Handover (Non-3GPP Access) and PDN GW Selection / 9.2.8:
PCRF Selection / 9.3:
Subscriber Data Management. / Chapter 10:
Home Subscriber Server (HSS) / 10.1:
Subscriber Profile Repository (SPR) / 10.2:
User Data Convergence (UDC) / 10.3:
UDC Overall Description / 10.3.1:
Front-Ends and User Data Repository / 10.3.2:
Voice and Emergency Services / Chapter 11:
Voice Services Based on Circuit-Switched Technology / 11.1:
Voice Services with IMS Technology / 11.2:
MMTel / 11.3:
MMTel Architecture / 11.3.1:
VoLTE / 11.4:
T-ADS / 11.5:
Ensuring Service Coverage / 11.5.1:
Single Radio Voice Call Continuity (SRVCC) / 11.6:
Entities with Additional Functions to Support SRVCC / 11.6.1:
IMS Centralized Services (ICS) / 11.7:
Service Centralization and Continuity Application Server (SCC-AS) / 11.7.1:
SRVCC from E-UTRAN to GERAN or UTRAN / 11.7.2:
SRVCC from E-UTRAN to CDMA 1×RTT / 11.8:
Migration Paths and Coexistence of Circuit-Switched and VoLTE / 11.9:
EPS Emergency Bearer Service for IMS Emergency / 11.11:
Multimedia Priority Service (MPS) / 11.12:
LTE Broadcasting / Chapter 12:
Background and Main Concepts / 12.1:
MBMS Solution Overview / 12.2:
MBMS User Services / 12.3:
Associated Delivery Procedures / 12.3.1:
Mobile Network Architecture for MBMS / 12.4:
Interfaces / 12.4.1:
MBMS Bearer Services / 12.5:
Session Start / 12.5.1:
Session Stop / 12.5.2:
Session Update / 12.5.3:
Positioning / Chapter 13:
Positioning Solutions / 13.1:
Positioning Architecture and Protocols / 13.2:
Positioning Methods / 13.3:
Position-Reporting Formats / 13.4:
EPS Positioning Entities and Interfaces / 13.5:
GMLC / 13.5.1:
E-SMLC / 13.5.2:
SLP / 13.5.3:
Le Interface / 13.5.4:
SLg Interface / 13.5.5:
SLs Interface / 13.5.6:
LTE Positioning Protocol (LPP) / 13.5.7:
LTE Positioning Protocol Annex (LPPa) / 13.5.8:
Positioning Procedure / 13.6:
Offload Functions and Simultaneous Multi-Access / Chapter 14:
Offloading the 3GPP RAN - Simultaneous Multi-Access / 14.1:
Multi-Access PDN Connectivity (MAPCON) / 14.2.1:
LP Flow Mobility (LFOM) / 14.2.2:
Non-Seamless WLAN Offloading (NSWO) / 14.2.3:
Offloading the Core and Transport Network - Selected IP Traffic Offload (SLPTO) / 14.3:
Access to Local Networks - Local LP Access (LLPA) / 14.4:
The Nuts and Bolts of EPC / Part IV:
EPS Network Entities and Interfaces / Chapter 15:
Network Entities / 15.1:
eNodeB / 15.1.1:
Mobility Management Entity / 15.1.2:
Serving GW / 15.1.3:
PDN GW / 15.1.4:
Policy and Charging Rules Function / 15.1.5:
Home eNodeB Subsystem and Related Entities / 15.1.6:
Control Plane Between UE, eNodeB, and MME / 15.2:
S1-MME / 15.2.1:
GTP-Based Interfaces / 15.3:
Control Plane / 15.3.1:
MME↔MME(SIO) / 15.3.2:
MME↔Serving GW(S 11) / 15.3.3:
Serving GW↔PDN GW (S5/S8) / 15.3.4:
SGSN↔MME (S3) / 15.3.5:
SGSN↔Serving GW (S4) / 15.3.6:
SGSN↔SGSN (S16) / 15.3.7:
Trusted WLAN Access Network ↔ PDN GW (S2a) / 15.3.8:
ePDG PDN GW (S2b) / 15.3.9:
User Plane / 15.3.10:
eNodeB Serving GW (S1-U) / 15.3.11:
UE ↔ eNodeB Serving GW PDN GW (GTP-TJ) / 15.3.12:
UE ↔ BSS ↔ SGSN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.13:
UE ↔ UTRAN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.14:
UE ↔ UTRAN ↔ SGSN Serving GW ↔ PDN GW (GTP-U) / 15.3.15:
UE ↔ Trusted WLAN Access Network ↔ PDN GW (GTP-U) / 15.3.16:
UE ↔ ePDG ↔ PDN GW (GTP-U) / 15.3.17:
PMLP-Based Interfaces / 15.4:
Serving GW-PDN GW (S5/S8) / 15.4.1:
Trusted Non-3GPP IP Access-PDN GW (S2a) / 15.4.2:
ePDG-PDN GW (S2b) / 15.4.3:
DSMLPv6-Based Interfaces / 15.5:
UE-PDN GW (S2c) / 15.5.1:
HSS-Related Interfaces and Protocols / 15.6:
MME-HSS (S6a) and SGSN-HSS (S6d) / 15.6.1:
AAA-Related Interfaces / 15.7:
AAA Server-HSS (SWx) / 15.7.1:
Trusted Non-3GPP Access-3GPP AAA Server/Proxy (STa) / 15.7.3:
Untrusted Non-3GPP BP Access-3GPP AAA Server/Proxy (SWa) / 15.7.4:
ePDG-3GPP AAA Server/Proxy (SWm) / 15.7.5:
PDN GW-3GPP AAA Server/Proxy (S6b) / 15.7.6:
3GPP AAA Proxy-3GPP AAA Server/Proxy (SWd) / 15.7.7:
PCC-Related Interfaces / 15.8:
PCEF-PCRF (Gx) / 15.8.1:
BBERF-PCRF (Gxa/Gxc) / 15.8.3:
PCRF-AE (Rx) / 15.8.4:
TDF-PCRF (Sd) / 15.8.5:
OCS-PCRF (Sy) / 15.8.6:
PCRF-PCRF (S9) / 15.8.7:
BPCF-PCRF (S9a) / 15.8.8:
SPR-PCRF(Sp) / 15.8.9:
EIR-Related Interfaces / 15.9:
MME-EIR and SGSN-EIR Interfaces (S13 and S13') / 15.9.1:
I-WLAN-Related Interfaces / 15.10:
UE-ePDG (SWu) / 15.10.1:
ANDSF-Related Interfaces / 15.11:
ISMP Policy Node / 15.11.1:
Discovery Information Node / 15.11.2:
UE Location Node / 15.11.3:
ISRP Node / 15.11.4:
Ext Node / 15.11.5:
HRPD IW-Related Interfaces / 15.12:
Optimized Handover and Related Interfaces (S101 and S103) / 15.12.1:
MME ↔ eHRPD Access Network (S101) / 15.12.2:
Serving GW ↔ HSGW (S103) / 15.12.3:
Interface to External Networks / 15.13:
Functions / 15.13.1:
CSS Interface / 15.14:
MME-CSS Interface (S7a) / 15.14.1:
Protocols / Chapter 16:
GPRS Tunneling Protocol Overview / 16.1:
Protocol Structure / 16.2.1:
Control Plane (GTPv2-C) / 16.2.2:
User Plane (GTPv1-U) / 16.2.3:
Protocol Format / 16.2.4:
Mobile IP / 16.3:
Host-Based and Network-Based Mobility Mechanisms / 16.3.1:
Basic Principles of Mobile IP / 16.3.3:
Mobile IPv6 Security / 16.3.4:
Packet Format / 16.3.5:
Dual-Stack Operation / 16.3.6:
Additional MLPv6 Features - Route Optimization / 16.3.7:
Proxy Mobile IPv6 / 16.4:
Basic Principles / 16.4.1:
PMLPv6 Security / 16.4.3:
PMLPv6 Packet Format / 16.4.4:
Diameter / 16.4.5:
Background / 16.5.1:
Diameter Nodes / 16.5.2:
Diameter Sessions, Connections, and Transport / 16.5.4:
Diameter Request Routing / 16.5.5:
Peer Discovery / 16.5.6:
Diameter Message Format / 16.5.7:
Generic Routing Encapsulation / 16.6:
Basic Protocol Aspects / 16.6.1:
GRE Packet Format / 16.6.3:
S1-AP / 16.7:
Non-Access Stratum (NAS) / 16.8:
EPS Mobility Management / 16.8.1:
EPS Session Management / 16.8.2:
Message Structure / 16.8.3:
Security-Protected NAS Messages / 16.8.4:
Message Transport / 16.8.5:
Future Extensions and Backward Compatibility / 16.8.6:
IP Security / 16.9:
Encapsulated Security Payload and Authentication Header / 16.9.1:
Internet Key Exchange / 16.9.3:
IKEv2 Mobility and Multi-Homing / 16.9.4:
Extensible Authentication Protocol / 16.10:
Overview / 16.10.1:
Protocol / 16.10.2:
Stream Control Transmission Protocol / 16.11:
Basic Protocol Features / 16.11.1:
Multi-Steaming / 16.11.3:
Multi-Homing / 16.11.4:
Packet Structure / 16.11.5:
Procedures / Chapter 17:
Attachment and Detachment for E-UTRAN / 17.1:
Attachment Procedure for E-UTRAN / 17.1.1:
Detachment Procedure for E-UTRAN / 17.1.2:
Tracking Area Update for E-UTRAN / 17.2:
Tracking Area Update Procedure / 17.2.1:
TA Update with MME Change / 17.2.2:
Service Request for E-UTRAN / 17.3:
UE Triggered Service Request / 17.3.1:
Network Triggered Service Request / 17.3.2:
Intra- and Inter-3GPP Access Handover / 17.4:
Phases of the Handover Procedures / 17.4.1:
Handover Cases in EPS for 3GPP Accesses / 17.4.2:
Handover within E-UTRAN Access / 17.4.3:
Handover between E-UTRAN and Other 3GPP Accesses (GERAN, UTRAN) with S4-SGSN / 17.4.4:
Handover for Gn/Gp-Based SGSN / 17.4.5:
Handover between GERAN and UTRAN Access Using S4 SGSN and GTP/PMTP Protocol / 17.4.6:
Bearer and QoS-Related Procedures / 17.5:
Bearer Procedures for E-UTRAN / 17.5.1:
Bearer Procedures for GERAN/UTRAN / 17.5.2:
Attachment and Detachment for Non-3GPP Accesses / 17.6:
Attachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.1:
Detachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.2:
Attachment Procedure in Untrusted Non-3GPP Access Using PMJPv6 (S2b) / 17.6.3:
Detachment Procedure in Untrusted Non-3GPP Access Using PMIPv6 (S2b) / 17.6.4:
Attachment Procedure in Trusted Non-3GPP Access Using DSMTPv6 (S2c) / 17.6.5:
Detachment Procedure in Trusted Non-3GPP Access Using DSMJPv6 (S2c) / 17.6.6:
Intersystem Handover Between 3GPP and Non-3GPP Accesses / 17.7:
Details of Handover in EPS with Non-3GPP Accesses / 17.7.1:
QoS-Related Procedures in Non-3GPP Accesses / 17.8:
Conclusion and Future of EPS / Part V:
Conclusions and Looking Ahead / Chapter 18:
Standards Bodies Associated with EPS / Appendix A:
References
Index
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
3.

電子ブック

EB
David Kleidermacher, Mike Kleidermacher
出版情報: Elsevier ScienceDirect Books , Burlington : Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgements
Introduction to Embedded Systems Security / Chapter 1:
What is Security? / 1.1:
What is an Embedded System? / 1.2:
Embedded Security Trends / 1.3:
Embedded Systems Complexity / 1.3.1:
Network Connectivity / 1.3.2:
Reliance on Embedded Systems for Critical Infrastructure / 1.3.3:
Sophisticated Attackers / 1.3.4:
Processor Consolidation / 1.3.5:
Security Policies / 1.4:
Perfect Security / 1.4.1:
Confidentiality, Integrity, and Availability / 1.4.2:
Isolation / 1.4.3:
Information Flow Control / 1.4.4:
Physical Security Policies / 1.4.5:
Apphcation-Specific Policies / 1.4.6:
Security Threats / 1.5:
Case Study: VxWorks Debug Port Vulnerability / 1.5.1:
Wrap-up / 1.6:
Key Points / 1.7:
Bibliography and Notes / 1.8:
Systems Software Considerations / Chapter 2:
The Role of the Operating System / 2.1:
Multiple Independent Levels of Security / 2.2:
Information Flow / 2.2.1:
Data Isolation / 2.2.2:
Damage Limitation / 2.2.3:
Periods Processing / 2.2.4:
Always Invoked / 2.2.5:
Tamper Proof / 2.2.6:
Evaluable / 2.2.7:
Microkernel versus Monolith / 2.3:
Case Study: The Duqu Virus / 2.3.1:
Core Embedded Operating System Security Requirements / 2.4:
Memory Protection / 2.4.1:
Virtual Memory / 2.4.2:
Fault Recovery / 2.4.3:
Guaranteed Resources / 2.4.4:
Virtual Device Drivers / 2.4.5:
Impact of Determinism / 2.4.6:
Secure Scheduling / 2.4.7:
Access Control and Capabilities / 2.5:
Case Study: Secure Web Browser / 2.5.1:
Granularity versus Simplicity of Access Controls / 2.5.2:
Whitelists versus Blacklists / 2.5.3:
Confused Deputy Problem / 2.5.4:
Capabilities versus Access Control Lists / 2.5.5:
Capability Confinement and Revocation / 2.5.6:
Secure Design Using Capabilities / 2.5.7:
Hypervisors and System Virtualization / 2.6:
Introduction to System Virtualization / 2.6.1:
Applications of System Virtualization / 2.6.2:
Environment Sandboxing / 2.6.3:
Virtual Security Appliances / 2.6.4:
Hypervisor Architectures / 2.6.5:
Paravirtualization / 2.6.6:
Leveraging Hardware Assists for Virtualization / 2.6.7:
Hypervisor Security / 2.6.8:
I/O Virtualization / 2.7:
The Need for Shared I/O / 2.7.1:
Emulation / 2.7.2:
Pass-through / 2.7.3:
Shared IOMMU / 2.7.4:
IOMMUs and Virtual Device Drivers / 2.7.5:
Secure I/O Virtualization within Microkernels / 2.7.6:
Remote Management / 2.8:
Security Implications / 2.8.1:
Assuring Integrity of the TCB / 2.9:
Trusted Hardware and Supply Chain / 2.9.1:
Secure Boot / 2.9.2:
Static versus Dynamic Root of Trust / 2.9.3:
Remote Attestation / 2.9.4:
Secure Embedded Software Development / 2.10:
Introduction to PHASE-Principles of High-Assurance Software Engineering / 3.1:
Minimal Implementation / 3.2:
Component Architecture / 3.3:
Runtime Componentization / 3.3.1:
A Note on Processes versus Threads / 3.3.2:
Least Privilege / 3.4:
Secure Development Process / 3.5:
Change Management / 3.5.1:
Peer Reviews / 3.5.2:
Development Tool Security / 3.5.3:
Secure Coding / 3.5.4:
Software Testing and Verification / 3.5.5:
Development Process Efficiency / 3.5.6:
Independent Expert Validation / 3.6:
Common Criteria / 3.6.1:
Case Study: Operating System Protection Profiles / 3.6.2:
Case Study: HAWS-High-Assurance Web Server / 3.7:
Model-Driven Design / 3.7.1:
Introduction to MDD / 3.8.1:
Executable Models / 3.8.2:
Modeling Languages / 3.8.3:
Types of MDD Platforms / 3.8.4:
Case Study: A Digital Pathology Scanner / 3.8.5:
Selecting an MDD Platform / 3.8.6:
Using MDD in Safety-and Security-Critical Systems / 3.8.7:
Embedded Cryptography / 3.9:
Introduction / 4.1:
U.S. Government Cryptographic Guidance / 4.2:
NSA Suite B / 4.2.1:
The One-Time Pad / 4.3:
Cryptographic Synchronization / 4.3.1:
Cryptographic Modes / 4.4:
Output Feedback / 4.4.1:
Cipher Feedback / 4.4.2:
OFB with CFB Protection / 4.4.3:
Traffic Flow Security / 4.4.4:
Counter Mode / 4.4.5:
Block Ciphers / 4.5:
Additional Cryptographic Block Cipher Modes / 4.5.1:
Authenticated Encryption / 4.6:
CCM / 4.6.1:
Galois Counter Mode / 4.6.2:
Public Key Cryptography / 4.7:
RSA / 4.7.1:
Equivalent Key Strength / 4.7.2:
Trapdoor Construction / 4.7.3:
Key Agreement / 4.8:
Man-in-the-Middle Attack on Diffie-Hellman / 4.8.1:
Public Key Authentication / 4.9:
Certificate Types / 4.9.1:
Elliptic Curve Cryptography / 4.10:
Elliptic Curve Digital Signatures / 4.10.1:
Elliptic Curve Anonymous Key Agreement / 4.10.2:
Cryptographic Hashes / 4.11:
Secure Hash Algorithm / 4.11.1:
MMO / 4.11.2:
Message Authentication Codes / 4.12:
Random Number Generation / 4.13:
True Random Number Generation / 4.13.1:
Pseudo-Random Number Generation / 4.13.2:
Key Management for Embedded Systems / 4.14:
Case Study: The Walker Spy Case / 4.14.1:
Key Management-Generalized Model / 4.14.2:
Key Management Case Studies / 4.14.3:
Cryptographic Certifications / 4.15:
FIPS 140-2 Certification / 4.15.1:
NSA Certification / 4.15.2:
Data Protection Protocols for Embedded Systems / 4.16:
Data-in-Motion Protocols / 5.1:
Generalized Model / 5.2.1:
Choosing the Network Layer for Security / 5.2.2:
Ethernet Security Protocols / 5.2.3:
BPsec versus SSL / 5.2.4:
IPsec / 5.2.5:
SSL/TLS / 5.2.6:
Embedded VPN Clients / 5.2.7:
DTLS / 5.2.8:
SSH / 5.2.9:
Custom Network Security Protocols / 5.2.10:
Application of Cryptography within Network Security Protocols / 5 2.11:
Secure Multimedia Protocols / 5.2.12:
Broadcast Security / 5.2.13:
Data-at-Rest Protocols / 5.3:
Choosing the Storage Layer for Security / 5.3.1:
Symmetric Encryption Algorithm Selection / 5.3.2:
Managing the Storage Encryption Key / 5 3 3:
Advanced Threats to Data Encryption Solutions / 5.3.4:
Emerging Applications / 5.4:
Embedded Network Transactions / 6.1:
Anatomy of a Network Transaction / 6.1.1:
State of Insecurity / 6.1.2:
Network-based Transaction Threats / 6 1 3:
Modern Attempts to Improve Network Transaction Security / 6.1.4:
Trustworthy Embedded Transaction Architecture / 6.1.5:
Automotive Security / 6.2:
Vehicular Security Threats and Mitigations / 6.2.1:
Secure Android / 6.3:
Android Security Retrospective / 6.3.1:
Android Device Rooting / 6.3.2:
Mobile Phone Data Protection: A Case Study of Defense-in-Depth / 6.3.3:
Android Sandboxing Approaches / 6.3.4:
Next-Generation Software-Defined Radio / 6.4:
Red-Black Separation / 6.4.1:
Software-Defined Radio Architecture / 6.4.2:
Enter Linux / 6.4.3:
Multi-Domain Radio / 6.4.4:
Index / 6.5:
Foreword
Preface
Acknowledgements
4.

電子ブック

EB
Wenji Mao, Fei-Yue Wang, FeiYue Wang
出版情報: Elsevier ScienceDirect Books , Burlington : Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
Research Methodology and Frameworks for ISI / 1.1:
The ACP Approach / 1.2:
Modeling with Artificial Societies / 1.2.1:
Analysis with Computational Experiments / 1.2.2:
Control Through Parallel Execution / 1.2.3:
Foundations in Philosophy and Physics / 1.2.4:
Outline of Chapters / 1.3:
Agent Modeling of Terrorist Organization Behavior / Chapter 2:
Modeling Organizational Behavior / 2.1:
Action Extraction from the Web / 2.2:
Action Data Collection / 2.2.1:
Raw Action Extraction / 2.2.2:
Action Elimination / 2.2.3:
Action Refinement / 2.2.4:
Extracting Causal Knowledge from the Web / 2.3:
Construction of Action Hierarchy / 2.4:
Designing, Causal Scenarios / 2.5:
Case Study on Terrorist Organization / 2.6:
Conclusion / 2.7:
Security Story Generation for Computational Experiments / Chapter 3:
Story Generation Systems / 3.1:
System Workflow and Narrative Structure / 3.2:
Story Extraction Approach / 3.3:
Text Processing with Domain Knowledge / 3.3.1:
Event Detection and Event Element Extraction / 3.3.2:
Design and Organization of Patterns / 3.3.3:
Event Element Standardization / 3.3.4:
Evaluation of Event Relations / 3.3.5:
Experiment / 3.4:
Forecasting Croup Behavior via Probabilistic Plan Inference / 3.5:
Review of Plan-Based Inference / 4.1:
Probabilistic Plan Representation / 4.2:
Probabilistic Reasoning Approach / 4.3:
Notation / 4.3.1:
Computation / 4.3.2:
Case Study in Security Informatics / 4.4:
Construction of Plan Library / 4.4.1:
The Test Set / 4.4.2:
Experimental Results / 4.4.3:
Forecasting Complex Croup Behavior via Multiple Plan Recognition / 4.5:
Multiple Plan Recognition for Behavior Prediction / 5.1:
The MPR Problem Definition / 5.2:
The Proposed MPR Approach / 5.3:
Constructing the Explanation Graph / 5.3.1:
Computing Probability of an Explanation / 5.3.2:
Finding the Best Explanation / 5.3.3:
Algorithm and Complexity Analysis / 5.3.4:
Discussion / 5.3.5:
Experimental Design / 5.4:
Results / 5.4.2:
Social Computing in ISI: A Synthetic View / 5.5:
Social Computing / 6.1:
Theoretical and Infrastructure Underpinnings / 6.1.1:
Major Application Areas / 6.1.2:
A Social Computing-Based ISI Research Framework / 6.2:
Control and Management Through Parallel Execution / 6.2.1:
Main Issues in the ACP-Based ISI Research Framework / 6.3:
Modeling Cyber-Physical Societies / 6.3.1:
Scenario-Based Computational Experiment and Evaluation / 6.3.2:
Interactive Co-Evolution of Artificial and Actual Systems / 6.3.3:
Social Media Information Processing and Standardization / 6.3.4:
ISI Research Platform / 6.3.5:
Summary / 6.4:
Cyber-Enabled Social Movement Organizations / Chapter 7:
Studies on Social Movement Organizations: A Review / 7.1:
A New Research Framework for CeSMOs / 7.2:
CeSMO Research Questions / 7.2.1:
A Social Computing-Based CeSMO Research Framework / 7.2.2:
Case Study: Wenchuan Earthquake / 7.3:
Discussions on CeSMO Research Issues / 7.4:
CeSMO Behavior Modeling / 7.4.1:
CeSMO Network Analysis / 7.4.2:
CeSMO Social and Cultural Information Modeling and Analysis / 7.4.3:
CeSMO Behavior Prediction / 7.4.4:
Cultural Modeling for Behavior Analysis and Prediction / 7.5:
Modeling Cultural Data in Security Informatics / 8.1:
Major Machine Learning Methods / 8.2:
Naive Bayesian (NB) / 8.2.1:
Support Vector Machines (SVMs) / 8.2.2:
Artificial Neural Networks / 8.2.3:
k-Nearest Neighbor (kNN) / 8.2.4:
Decision Trees / 8.2.5:
Random Forest (RF) / 8.2.6:
Associative Classification (AC) / 8.2.7:
Experiment and Analysis / 8.3:
Datasets / 8.3.1:
Evaluation Measures / 8.3.2:
Observations and Analysis / 8.3.3:
Discussions on Cultural Modeling Research Issues / 8.4:
Cultural Datasets Construction / 8.4.1:
Attribute Selection / 8.4.2:
Best Performance of Classifiers / 8.4.3:
Handling the Class Imbalance Problem / 8.4.4:
Model Interpretability / 8.4.5:
Incorporation of Domain Knowledge / 8.4.6:
Cultural and Social Dynamics of Behavioral Patterns / 8.4.7:
Index / 8.5:
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
5.

電子ブック

EB
Tammy Noergaard
出版情報: Elsevier ScienceDirect Books , Newnes, 2013
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Acknowledgments
About the Author
Introduction to Embedded Systems / Section I:
A Systems Engineering Approach to Embedded Systems Design / Chapter 1:
Know Your Standards / Chapter 2:
Embedded Hardware / Section II:
Embedded Hardware Building Blocks and the Embedded Board / Chapter 3:
Embedded Processors / Chapter 4:
Board Memory / Chapter 5:
Board I/O (Input/Output) / Chapter 6:
Board Buses / Chapter 7:
Embedded Software Introduction / Section III:
Device Drivers / Chapter 8:
Embedded Operating Systems / Chapter 9:
Middleware and Application Software / Chapter 10:
Putting It All Together: Design and Development / Section IV:
Defining the System-Creating the Architecture and Documenting the Design / Chapter 11:
The Final Phases of Embedded Design: Implementation and Testing / Chapter 12:
Projects and Exercises / Appendix A:
Schematic Symbols / Appendix B:
Acronyms and Abbreviations / Appendix C:
Glossary / Appendix D:
Index
What's on the CD-ROM
Foreword
Acknowledgments
About the Author
6.

電子ブック

EB
Magnus Olsson, Catherine Mulligan, Magnus Olsson
出版情報: Elsevier ScienceDirect Books , Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
List of Abbreviations
Introduction - Background and Vision of EPC / Part I:
Mobile Broadband and the Core Network Evolution / Chapter 1:
A Global Standard / 1.1:
Origins of the Evolved Packet Core / 1.2:
3GPP Radio Access Technologies / 1.2.1:
3GPP2 Radio Access Technologies / 1.2.2:
SAE - Building Bridges Between Different Networks / 1.2.3:
A Shifting Value Chain / 1.3:
Terminology Used in This Book / 1.4:
Overview of EPS / Part II:
Architecture Overview / Chapter 2:
EPS Architecture / 2.1:
Basic LP Connectivity Over LTE Access / 2.1.1:
Adding More Advanced Functionality for LTE Access / 2.1.2:
Interworking Between LTE and GSM/GPRS or WCDMA/HSPA / 2.1.3:
Support for 3GPP Voice Services / 2.1.4:
Interworking Between LTE and CDMA Networks / 2.1.5:
Interworking Between 3GPP Access Technologies and Non-3GPP Access Technologies / 2.1.6:
Support for Broadcasting in Cellular Networks / 2.1.7:
Positioning Services / 2.1.8:
Optimizations for Small Cells and Local Access / 2.1.9:
Miscellaneous Features / 2.1.10:
Summary of the Architecture Overview / 2.1.11:
Mobile Network Radio Technologies / 2.2:
Overview of Radio Networks for Mobile Services / 2.2.1:
Radio Network Functionality / 2.2.2:
GSM / 2.2.3:
WCDMA / 2.2.4:
LTE / 2.2.5:
EPS Deployment Scenarios and Operator Cases / Chapter 3:
Scenario 1: Existing GSM/GPRS and/or WCDMA/HSPA Operators Deploying LTE/EPC / 3.1:
First Phase - Initial EPC Deployment / 3.1.1:
Second Phase - Integration with Existing Packet Core / 3.1.2:
Third Phase - Further Optimizations Towards the Common Core / 3.1.3:
Scenario 2: Existing CDMA Operators Deploying LTE/EPC / 3.2:
Scenario 3: New Operators Deploying LTE/EPC / 3.3:
Data Services in EPS / Chapter 4:
Messaging Services / 4.1:
Machine Type Communication / 4.2:
Industrial and Corporate Uses / 4.2.1:
Societal - M2M and Sustainable Development / 4.2.2:
Voice Services in EPS / Chapter 5:
Realization of Voice Over LTE / 5.1:
Voice Services Using IMS Technology / 5.2:
Single-Radio Voice Call Continuity (SRVCC) / 5.3:
Circuit-Switched Fallback / 5.4:
Comparing MMTel/SRVCC and CSFB / 5.5:
IMS Emergency Calls and Priority Services / 5.6:
Key Concepts and Services / Part III:
Session Management and Mobility / Chapter 6:
IP Connectivity and Session Management / 6.1:
The LP Connection / 6.1.1:
Session Management, Bearers, and QoS Aspects / 6.2:
General / 6.2.1:
The EPS Bearer for E-UTRAN Access / 6.2.2:
Session Management for EPS and GERAN/UTRAN Accesses / 6.2.3:
Session Management for Other Accesses / 6.2.4:
Subscriber Identifiers and Corresponding Legacy Identities / 6.3:
Permanent Subscriber Identifiers / 6.3.1:
Temporary Subscriber Identifiers / 6.3.2:
Relation to Subscription Identifiers in 2G/3G / 6.3.3:
Mobility Principles / 6.4:
Mobility within 3GPP Family of Accesses / 6.4.1:
Idle-Mode Signaling Reduction (ISR) / 6.4.3:
Closed Subscriber Group / 6.4.4:
Mobility Between E-UTRAN and HRPD / 6.4.5:
Generic Mobility Between 3GPP and Non-3GPP Accesses / 6.4.6:
Access Network Discovery and Selection / 6.4.7:
Interworking with Managed WLAN Networks / 6.5:
Pooling, Overload Protection, and Congestion Control / 6.6:
Security / Chapter 7:
Introduction / 7.1:
Security Services / 7.2:
Security Domains / 7.2.1:
Network Access Security / 7.3:
Access Security in E-UTRAN / 7.3.1:
Interworking with GERAN/UTRAN / 7.3.2:
Special Consideration for IMS Emergency Calls / 7.3.3:
Trusted and Untrusted Non-3GPP Accesses / 7.3.4:
Access Security in Trusted Non-3GPP Accesses / 7.3.5:
Access Security in Untrusted Non-3GPP Access / 7.3.6:
Special Considerations for Host-Based Mobility DSMIPv6 / 7.3.7:
Network Domain Security / 7.4:
User Domain Security / 7.5:
Security Aspects of Home eNBs and Home NBs / 7.6:
H(e)NB Security Architecture / 7.6.1:
Closed Subscriber Groups / 7.6.2:
Device Authentication / 7.6.3:
Hosting Party Authentication / 7.6.4:
Backhaul Link Security / 7.6.5:
Location Verification / 7.6.6:
Lawful Intercept / 7.7:
Quality of Service, Charging, and Policy Control / Chapter 8:
Quality of Service / 8.1:
QoS in E-UTRAN / 8.1.1:
QoS Aspects When Interworking with Other Accesses / 8.1.2:
Policy and Charging Control / 8.2:
The PCC Architecture / 8.2.1:
Basic PCC Concepts / 8.2.2:
Network vs. Terminal-Initiated QoS Control / 8.2.3:
PCC and Roaming / 8.2.4:
Additional PCC Features Developed Since Release 8 / 8.2.5:
PCC Support for Fixed Broadband Access / 8.2.6:
Charging / 8.3:
Selection Functions / Chapter 9:
Architecture Overview for Selection Functions / 9.1:
Selection of MME, SGSN, Serving GW, and PDN GW / 9.2:
Selection Procedure at a Glance / 9.2.1:
Use of DNS Infrastructure / 9.2.2:
MME Selection / 9.2.3:
SGSN Selection Function for EPS / 9.2.4:
GW Selection Overview / 9.2.5:
PDN GW Selection Function / 9.2.6:
Serving GW Selection Function / 9.2.7:
Handover (Non-3GPP Access) and PDN GW Selection / 9.2.8:
PCRF Selection / 9.3:
Subscriber Data Management. / Chapter 10:
Home Subscriber Server (HSS) / 10.1:
Subscriber Profile Repository (SPR) / 10.2:
User Data Convergence (UDC) / 10.3:
UDC Overall Description / 10.3.1:
Front-Ends and User Data Repository / 10.3.2:
Voice and Emergency Services / Chapter 11:
Voice Services Based on Circuit-Switched Technology / 11.1:
Voice Services with IMS Technology / 11.2:
MMTel / 11.3:
MMTel Architecture / 11.3.1:
VoLTE / 11.4:
T-ADS / 11.5:
Ensuring Service Coverage / 11.5.1:
Single Radio Voice Call Continuity (SRVCC) / 11.6:
Entities with Additional Functions to Support SRVCC / 11.6.1:
IMS Centralized Services (ICS) / 11.7:
Service Centralization and Continuity Application Server (SCC-AS) / 11.7.1:
SRVCC from E-UTRAN to GERAN or UTRAN / 11.7.2:
SRVCC from E-UTRAN to CDMA 1×RTT / 11.8:
Migration Paths and Coexistence of Circuit-Switched and VoLTE / 11.9:
EPS Emergency Bearer Service for IMS Emergency / 11.11:
Multimedia Priority Service (MPS) / 11.12:
LTE Broadcasting / Chapter 12:
Background and Main Concepts / 12.1:
MBMS Solution Overview / 12.2:
MBMS User Services / 12.3:
Associated Delivery Procedures / 12.3.1:
Mobile Network Architecture for MBMS / 12.4:
Interfaces / 12.4.1:
MBMS Bearer Services / 12.5:
Session Start / 12.5.1:
Session Stop / 12.5.2:
Session Update / 12.5.3:
Positioning / Chapter 13:
Positioning Solutions / 13.1:
Positioning Architecture and Protocols / 13.2:
Positioning Methods / 13.3:
Position-Reporting Formats / 13.4:
EPS Positioning Entities and Interfaces / 13.5:
GMLC / 13.5.1:
E-SMLC / 13.5.2:
SLP / 13.5.3:
Le Interface / 13.5.4:
SLg Interface / 13.5.5:
SLs Interface / 13.5.6:
LTE Positioning Protocol (LPP) / 13.5.7:
LTE Positioning Protocol Annex (LPPa) / 13.5.8:
Positioning Procedure / 13.6:
Offload Functions and Simultaneous Multi-Access / Chapter 14:
Offloading the 3GPP RAN - Simultaneous Multi-Access / 14.1:
Multi-Access PDN Connectivity (MAPCON) / 14.2.1:
LP Flow Mobility (LFOM) / 14.2.2:
Non-Seamless WLAN Offloading (NSWO) / 14.2.3:
Offloading the Core and Transport Network - Selected IP Traffic Offload (SLPTO) / 14.3:
Access to Local Networks - Local LP Access (LLPA) / 14.4:
The Nuts and Bolts of EPC / Part IV:
EPS Network Entities and Interfaces / Chapter 15:
Network Entities / 15.1:
eNodeB / 15.1.1:
Mobility Management Entity / 15.1.2:
Serving GW / 15.1.3:
PDN GW / 15.1.4:
Policy and Charging Rules Function / 15.1.5:
Home eNodeB Subsystem and Related Entities / 15.1.6:
Control Plane Between UE, eNodeB, and MME / 15.2:
S1-MME / 15.2.1:
GTP-Based Interfaces / 15.3:
Control Plane / 15.3.1:
MME↔MME(SIO) / 15.3.2:
MME↔Serving GW(S 11) / 15.3.3:
Serving GW↔PDN GW (S5/S8) / 15.3.4:
SGSN↔MME (S3) / 15.3.5:
SGSN↔Serving GW (S4) / 15.3.6:
SGSN↔SGSN (S16) / 15.3.7:
Trusted WLAN Access Network ↔ PDN GW (S2a) / 15.3.8:
ePDG PDN GW (S2b) / 15.3.9:
User Plane / 15.3.10:
eNodeB Serving GW (S1-U) / 15.3.11:
UE ↔ eNodeB Serving GW PDN GW (GTP-TJ) / 15.3.12:
UE ↔ BSS ↔ SGSN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.13:
UE ↔ UTRAN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.14:
UE ↔ UTRAN ↔ SGSN Serving GW ↔ PDN GW (GTP-U) / 15.3.15:
UE ↔ Trusted WLAN Access Network ↔ PDN GW (GTP-U) / 15.3.16:
UE ↔ ePDG ↔ PDN GW (GTP-U) / 15.3.17:
PMLP-Based Interfaces / 15.4:
Serving GW-PDN GW (S5/S8) / 15.4.1:
Trusted Non-3GPP IP Access-PDN GW (S2a) / 15.4.2:
ePDG-PDN GW (S2b) / 15.4.3:
DSMLPv6-Based Interfaces / 15.5:
UE-PDN GW (S2c) / 15.5.1:
HSS-Related Interfaces and Protocols / 15.6:
MME-HSS (S6a) and SGSN-HSS (S6d) / 15.6.1:
AAA-Related Interfaces / 15.7:
AAA Server-HSS (SWx) / 15.7.1:
Trusted Non-3GPP Access-3GPP AAA Server/Proxy (STa) / 15.7.3:
Untrusted Non-3GPP BP Access-3GPP AAA Server/Proxy (SWa) / 15.7.4:
ePDG-3GPP AAA Server/Proxy (SWm) / 15.7.5:
PDN GW-3GPP AAA Server/Proxy (S6b) / 15.7.6:
3GPP AAA Proxy-3GPP AAA Server/Proxy (SWd) / 15.7.7:
PCC-Related Interfaces / 15.8:
PCEF-PCRF (Gx) / 15.8.1:
BBERF-PCRF (Gxa/Gxc) / 15.8.3:
PCRF-AE (Rx) / 15.8.4:
TDF-PCRF (Sd) / 15.8.5:
OCS-PCRF (Sy) / 15.8.6:
PCRF-PCRF (S9) / 15.8.7:
BPCF-PCRF (S9a) / 15.8.8:
SPR-PCRF(Sp) / 15.8.9:
EIR-Related Interfaces / 15.9:
MME-EIR and SGSN-EIR Interfaces (S13 and S13') / 15.9.1:
I-WLAN-Related Interfaces / 15.10:
UE-ePDG (SWu) / 15.10.1:
ANDSF-Related Interfaces / 15.11:
ISMP Policy Node / 15.11.1:
Discovery Information Node / 15.11.2:
UE Location Node / 15.11.3:
ISRP Node / 15.11.4:
Ext Node / 15.11.5:
HRPD IW-Related Interfaces / 15.12:
Optimized Handover and Related Interfaces (S101 and S103) / 15.12.1:
MME ↔ eHRPD Access Network (S101) / 15.12.2:
Serving GW ↔ HSGW (S103) / 15.12.3:
Interface to External Networks / 15.13:
Functions / 15.13.1:
CSS Interface / 15.14:
MME-CSS Interface (S7a) / 15.14.1:
Protocols / Chapter 16:
GPRS Tunneling Protocol Overview / 16.1:
Protocol Structure / 16.2.1:
Control Plane (GTPv2-C) / 16.2.2:
User Plane (GTPv1-U) / 16.2.3:
Protocol Format / 16.2.4:
Mobile IP / 16.3:
Host-Based and Network-Based Mobility Mechanisms / 16.3.1:
Basic Principles of Mobile IP / 16.3.3:
Mobile IPv6 Security / 16.3.4:
Packet Format / 16.3.5:
Dual-Stack Operation / 16.3.6:
Additional MLPv6 Features - Route Optimization / 16.3.7:
Proxy Mobile IPv6 / 16.4:
Basic Principles / 16.4.1:
PMLPv6 Security / 16.4.3:
PMLPv6 Packet Format / 16.4.4:
Diameter / 16.4.5:
Background / 16.5.1:
Diameter Nodes / 16.5.2:
Diameter Sessions, Connections, and Transport / 16.5.4:
Diameter Request Routing / 16.5.5:
Peer Discovery / 16.5.6:
Diameter Message Format / 16.5.7:
Generic Routing Encapsulation / 16.6:
Basic Protocol Aspects / 16.6.1:
GRE Packet Format / 16.6.3:
S1-AP / 16.7:
Non-Access Stratum (NAS) / 16.8:
EPS Mobility Management / 16.8.1:
EPS Session Management / 16.8.2:
Message Structure / 16.8.3:
Security-Protected NAS Messages / 16.8.4:
Message Transport / 16.8.5:
Future Extensions and Backward Compatibility / 16.8.6:
IP Security / 16.9:
Encapsulated Security Payload and Authentication Header / 16.9.1:
Internet Key Exchange / 16.9.3:
IKEv2 Mobility and Multi-Homing / 16.9.4:
Extensible Authentication Protocol / 16.10:
Overview / 16.10.1:
Protocol / 16.10.2:
Stream Control Transmission Protocol / 16.11:
Basic Protocol Features / 16.11.1:
Multi-Steaming / 16.11.3:
Multi-Homing / 16.11.4:
Packet Structure / 16.11.5:
Procedures / Chapter 17:
Attachment and Detachment for E-UTRAN / 17.1:
Attachment Procedure for E-UTRAN / 17.1.1:
Detachment Procedure for E-UTRAN / 17.1.2:
Tracking Area Update for E-UTRAN / 17.2:
Tracking Area Update Procedure / 17.2.1:
TA Update with MME Change / 17.2.2:
Service Request for E-UTRAN / 17.3:
UE Triggered Service Request / 17.3.1:
Network Triggered Service Request / 17.3.2:
Intra- and Inter-3GPP Access Handover / 17.4:
Phases of the Handover Procedures / 17.4.1:
Handover Cases in EPS for 3GPP Accesses / 17.4.2:
Handover within E-UTRAN Access / 17.4.3:
Handover between E-UTRAN and Other 3GPP Accesses (GERAN, UTRAN) with S4-SGSN / 17.4.4:
Handover for Gn/Gp-Based SGSN / 17.4.5:
Handover between GERAN and UTRAN Access Using S4 SGSN and GTP/PMTP Protocol / 17.4.6:
Bearer and QoS-Related Procedures / 17.5:
Bearer Procedures for E-UTRAN / 17.5.1:
Bearer Procedures for GERAN/UTRAN / 17.5.2:
Attachment and Detachment for Non-3GPP Accesses / 17.6:
Attachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.1:
Detachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.2:
Attachment Procedure in Untrusted Non-3GPP Access Using PMJPv6 (S2b) / 17.6.3:
Detachment Procedure in Untrusted Non-3GPP Access Using PMIPv6 (S2b) / 17.6.4:
Attachment Procedure in Trusted Non-3GPP Access Using DSMTPv6 (S2c) / 17.6.5:
Detachment Procedure in Trusted Non-3GPP Access Using DSMJPv6 (S2c) / 17.6.6:
Intersystem Handover Between 3GPP and Non-3GPP Accesses / 17.7:
Details of Handover in EPS with Non-3GPP Accesses / 17.7.1:
QoS-Related Procedures in Non-3GPP Accesses / 17.8:
Conclusion and Future of EPS / Part V:
Conclusions and Looking Ahead / Chapter 18:
Standards Bodies Associated with EPS / Appendix A:
References
Index
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
7.

電子ブック

EB
Rob Huddleston
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Incorporated, 2010
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgments
Introduction
Quick Start: Dive Into Flash Catalyst CS5
Rich Internet Applications and the Flash Platform / Part I:
Understanding Rich Internet Applications / Chapter 1:
Introducing Flash Catalyst / Chapter 2:
Working with Other Applications / Chapter 3:
Designing the Application / Part II:
Wireframing an Application in Flash Catalyst / Chapter 4:
Creating an Application Comp in Illustrator / Chapter 5:
Creating Assets in Photoshop / Chapter 6:
Using Fireworks with Flash Catalyst / Chapter 7:
Creating the Application in Catalyst / Part III:
Converting Illustrator and Photoshop Artwork into Catalyst Projects / Chapter 8:
Converting Artwork to Components / Chapter 9:
Creating View States / Chapter 10:
Adding Animation / Chapter 11:
Working with Design-time Data / Chapter 12:
Adding Multimedia / Chapter 13:
Exporting Projects into Flash Builder 4 / Part IV:
Flash Builder 4 and the Flex Framework / Chapter 14:
Export a Flash Catalyst Project to Flash Builder / Chapter 15:
Returning a Project to Flash Catalyst / Chapter 16:
Exporting Catalyst Projects Directly to Flash Player / Chapter 17:
Creating a Project for AIR / Chapter 18:
Build a Complete Project / Part V:
Creating a Design Comp in Illustrator / Chapter 19:
Importing the Design into Catalyst / Chapter 20:
Importing Additional Artwork from Illustrator and Photoshop / Chapter 21:
Converting Artwork to Components in Your Project / Chapter 22:
Creating View States in Your Project / Chapter 23:
Adding Data Lists / Chapter 24:
Importing Your Project into Flash Builder / Chapter 25:
Connecting Your Project to Live Data / Chapter 26:
Appendixes / Part VI:
Keyboard Shortcuts / Appendix A:
Best Practices / Appendix B:
What's on the Book's Web Site / Appendix C:
Index
Foreword
Preface
Acknowledgments
8.

電子ブック

EB
Roger Dube, Roger R. Dube
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2008
所蔵情報: loading…
目次情報: 続きを見る
The Elements of Computer Security / 1:
Cryptography Approaches and Attacks / 2:
Key Generation and Distribution Approaches and Attacks / 3:
The Qualities of Workable Security Solutions / 4:
Secure Coprocessors / 5:
Secure bootstrap Loading / 6:
Secure Memory Management and Trusted Execution Technology / 7:
The Trusted Platform Module / 8:
Field-Programmable Gate Arrays / 9:
Hardware-Based Authentication / 10:
A Closer Look At Biometrics / 11:
Tokens: Something You Have / 12:
Location Technologies / 13:
Putting It All Together / 14:
Glossary
Index
The Elements of Computer Security / 1:
Cryptography Approaches and Attacks / 2:
Key Generation and Distribution Approaches and Attacks / 3:
9.

電子ブック

EB
Rose Qingyang Hu, Rose Qingyang Hu, Yi Qian, Haijian Sun
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2013
所蔵情報: loading…
10.

電子ブック

EB
Rebecca S. Busch
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2008
所蔵情報: loading…
目次情報: 続きを見る
Preface
About the Author
Acknowledgments
Introduction
Market Background / Chapter 1:
E-Health
How is Electronic Information Created?Information Technology Considerations
How is Health Information Created?Review of Primary HCC Market Players
Patients
Providers
Third Party Vendors
Payers
Review of HCC Secondary Market Players
Major Initiative for E-Health
Audit Implication Overview
Industry Application / Chapter 2:
Public Uses
Private Uses
Information Continuum
Market Standards and Initiatives
Agency for Healthcare Research and Quality
Health Level Seven
Certification Commission for Healthcare Information Technology
Department of Defense Records Management Program
Association of Records Managers and Administrators
Impact of E-Health on Case Management / Chapter 3:
Financial Picture
Hospital-Based FCM Application
Background Information and Provider Perspective
Problem: Getting Paid Correctly for Services Provided
Findings
Additional Findings
Summary
Consumer-Based FCM Application
Market Problems: The Industry as It Operates Today
Consumer FCM Model
Healthcare Portfolio Application
Virtual Case Management
VCM Payer Model
VCM Patient Model
VCM Hospital Model
VCM Physician Model
VCM Allied Health Services
VCM Nontraditional Health Services Model
VCM Other Business Services Model
Data in an E-Health Environment / Chapter 4:
Data Library
Data Intelligence
New Data
More New Data
Processed Data
Data Warehouse
Algorithms / Chapter 5:
Background
Understanding Algorithms
Data Elements
Case Study
Algorithm SelectionAuditor Implication Overview
Data-Driven Health Decisions in an E-Health Environment / Chapter 6:
Knowledge Models
Primary Healthcare Continuum
Secondary Healthcare Continuum
Third-Party Vendor Knowledge Model
Knowledge Models For White-Collar and Organized Crime
Sample Identity Theft Case
Medical Identity Theft
Medical Identity Theft - Definition
How Medical Identity Theft Occurs
Damages To Primary Victims
Medical Identity Theft From A Consumer Perspective
When The Consumer Is Not Aware
When The Consumer Is Involved
When An Individual Wants Products Or Services
Damages To Secondary Victims
Medical Identity Theft From An Entity's Perspective
Auditor Considerations
Sample Fraud Case
Sample Pharmaceutical Fraud Case
Examples Of Worldwide Activity
Analytic Tools and Audit Checklists / Chapter 7:
E-Health And Healthcare Business Processes
Patient Business Process
Financial Case Management Advocacy / Problem #1:
Clinical Case Management Advocacy / Problem #2:
Provider Business Process
Lack Of Electronic Internal Controls
Lack Of Internal Controls With User Identity
Lack Of Internal Controls For Services Provided And Charged / Problem #3:
Payer Business Process
Use And Loss Of Health Information - Handling Subcontracted Vendors
Lack Of Insurance - Processing Fraudulent Claims For Enrolled Beneficiaries
Plan Sponsor Business Process
Employee Working Environments
Employer Increase In Healthcare Expenditures
Third-Party Vendor Business Process
Problem Increase In Pharmaceutic
Preface
About the Author
Acknowledgments
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼