+ All Categories
Home > Documents > Auditing and GRC Automation Unsupervised …...News 2/2013 Computer Science 77 J. M. Kizza,...

Auditing and GRC Automation Unsupervised …...News 2/2013 Computer Science 77 J. M. Kizza,...

Date post: 30-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
8
News 2/2013 Computer Science 75 S. Bandyopadhyay, Indian Statistical Institute, Kolkata, India; S. Saha, Indian Institute of Technology, Patna, India Unsupervised Classification Similarity Measures, Classical and Metaheuristic Approaches, and Applications Clustering is an important unsupervised classifica- tion technique where data points are grouped such that points that are similar in some sense belong to the same cluster. Cluster analysis is a complex problem as a variety of similarity and dissimilar- ity measures exist in the literature. is is the first book focused on clustering with a particular em- phasis on symmetry-based measures of similarity and metaheuristic approaches. Features 7 Describes both well-established and me- taheuristic clustering techniques 7 Offers a theoretical analysis of symmetry-based clustering techniques 7 Includes extensive real-world ap- plications in remote-sensing satellite imaging, MR brain imaging, bioinformatics, and face detection Contents Chap. 1 Introduction.- Chap. 2 Some Single- and Multiobjective Optimization Techniques.- Chap. 3 SimilarityMeasures.- Chap. 4 Clustering Algo- rithms.- Chap. 5 Point Symmetry Based Distance Measures and their Applications to Clustering.- Chap. 6 A Validity Index Based on Symmetry: Ap- plication to Satellite Image Segmentation.- Chap. 7 Symmetry Based Automatic Clustering.- Chap. 8 Some Line Symmetry Distance Based Clustering Techniques.- Chap. 9 Use of Multiobjective Opti- mization for Data Clustering.- References.- Index. Fields of interest Artificial Intelligence (incl. Robotics); Compu- tational Biology/Bioinformatics; Information Systems and Communication Service Target groups Graduate Product category Graduate/Advanced undergraduate textbook Available 2013. XVI, 232 p. 92 illus., 14 in color. Hardcover 7 * € (D) 53,45 | € (A) 54,95 | sFr 66,50 7 € 49,95 | £44.99 ISBN 978-3-642-32450-5 9<HTOGPC=dcefaf> M. Chuprunov, Riscomp GmbH, Rothenthurm, Switzerland Auditing and GRC Automation in SAP Contents PART I — From Legislation to Concept: ICS and Compliance in the ERP Environment.- Legal Requirements in ICS Compliance.- e Auditor Is Coming: When, Why, and How to Cope.- ICS Requirements and ERP Systems: Basic Principles, Frameworks, Structure.- How Does SAP Deal with Risk- and Compliance-Related Topics?.- PART II — From Concept to Content: Audit Guide for SAP ERP.- Audit-Relevant SAP Basics.- IT General Controls in SAP ERP.- General Applica- tion Controls in SAP ERP.- Controls in Financial Accounting.- Control Mechanisms in the SAP ERP-Supported Procure to Pay Process.- Control Mechanisms in the SAP ERP-Supported Order to Cash Process.- Data Protection Compliance in SAP ERP Human Capital Management.- Fraud in an SAP System.- Excursion: FDA Compliance and Controls in SAP.- Examples of Efficiency-Oriented and Profitability-Oriented Analysis Scenarios in SAP ERP.- PART III — From Concept and Content to Implementation: Automation of an Internal Control System.- ICS Automation: How to Set the COSO Cube in Motion.- ICS Automa- tion Using SAP Process Control.- Implementation of Automated Test and Monitoring Scenarios in the SAP ERP Environment.- Experiences from Practice and Projects. Fields of interest Computer Appl. in Administrative Data Pro- cessing; Accounting/Auditing; Legal Aspects of Computing Target groups Professional/practitioner Product category Handbook Due March 2013 2013. XVI, 700 p. 273 illus. Hardcover 7 * € (D) 96,29 | € (A) 98,99 | sFr 120,00 7 € 89,99 | £81.00 ISBN 978-3-642-35301-7 9<HTOGPC=dfdabh> S. Elliott Sim, Many Roads Studios, Toronto, ON, Canada; R. E. Gallardo-Valencia, Intel Corporation, Santa Clara, CA, USA (Eds) Finding Source Code on the Web for Remix and Reuse Contents Introduction: Remixing Snippets and Reusing Components.- Unweaving Code Search toward Remixing-Centered Programming Support.- Archetypal Internet-Scale Source Code Search- ing.- A Controlled Experiment on the Process Used by Developers During Internet-Scale Code Search.- Artifact Representation Techniques for Large-Scale Soſtware Search Engines.- Krugle Code Search Architecture.- Experiences and Les- sons Learned with the Development of a Source Code Search Engine.- Infrastructure for Building Code Search Applications for Developers.- De- veloping Soſtware with Open Source Soſtware Components.- Open Source Reuse and Strategic Imperatives.- Applying Program Analysis to Code Retrieval.- Test-Driven Reuse: Key to Improving Precision of Search Engines for Soſtware Reuse.- Soſtware Problems that Motivate Web Searches.- Novel and Applied Algorithms in a Search Engine for Java Code Snippets.- Facilitating Crowd Sourced Soſtware Engineering via Stack Over- flow.- Intellectual Property Law in Source Code Reuse and Remix.- Richie Boss: Private Investiga- tor Manager. Fields of interest Soſtware Engineering/Programming and Op- erating Systems; User Interfaces and Human Computer Interaction; Information Storage and Retrieval Target groups Research Product category Contributed volume Due May 2013 2013. V, 345 p. 50 illus. Hardcover 7 * € (D) 101,64 | € (A) 104,49 | sFr 126,50 7 € 94,99 | £85.50 ISBN 978-1-4614-6595-9 9<HTMERB=egfjfj>
Transcript
Page 1: Auditing and GRC Automation Unsupervised …...News 2/2013 Computer Science 77 J. M. Kizza, University of Tennessee at Chattanooga, TN, USA Ethical and Social Issues in the Information

News 2/2013 Computer Science

75

S. Bandyopadhyay, Indian Statistical Institute, Kolkata, India; S. Saha, Indian Institute of Technology, Patna, India

Unsupervised ClassificationSimilarity Measures, Classical and Metaheuristic Approaches, and Applications

Clustering is an important unsupervised classifica-tion technique where data points are grouped such that points that are similar in some sense belong to the same cluster. Cluster analysis is a complex problem as a variety of similarity and dissimilar-ity measures exist in the literature. This is the first book focused on clustering with a particular em-phasis on symmetry-based measures of similarity and metaheuristic approaches.

Features 7 Describes both well-established and me-taheuristic clustering techniques 7 Offers a theoretical analysis of symmetry-based clustering techniques 7 Includes extensive real-world ap-plications in remote-sensing satellite imaging, MR brain imaging, bioinformatics, and face detection

Contents Chap. 1 Introduction.- Chap. 2 Some Single- and Multiobjective Optimization Techniques.- Chap. 3 SimilarityMeasures.- Chap. 4 Clustering Algo-rithms.- Chap. 5 Point Symmetry Based Distance Measures and their Applications to Clustering.- Chap. 6 A Validity Index Based on Symmetry: Ap-plication to Satellite Image Segmentation.- Chap. 7 Symmetry Based Automatic Clustering.- Chap. 8 Some Line Symmetry Distance Based Clustering Techniques.- Chap. 9 Use of Multiobjective Opti-mization for Data Clustering.- References.- Index.

Fields of interestArtificial Intelligence (incl. Robotics); Compu-tational Biology/Bioinformatics; Information Systems and Communication Service

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Available

2013. XVI, 232 p. 92 illus., 14 in color. Hardcover7 * € (D) 53,45 | € (A) 54,95 | sFr 66,507 € 49,95 | £44.99ISBN 978-3-642-32450-5

9<HTOGPC=dcefaf>

M. Chuprunov, Riscomp GmbH, Rothenthurm, Switzerland

Auditing and GRC Automation in SAPContents PART I — From Legislation to Concept: ICS and Compliance in the ERP Environment.- Legal Requirements in ICS Compliance.- The Auditor Is Coming: When, Why, and How to Cope.- ICS Requirements and ERP Systems: Basic Principles, Frameworks, Structure.- How Does SAP Deal with Risk- and Compliance-Related Topics?.- PART II — From Concept to Content: Audit Guide for SAP ERP.- Audit-Relevant SAP Basics.- IT General Controls in SAP ERP.- General Applica-tion Controls in SAP ERP.- Controls in Financial Accounting.- Control Mechanisms in the SAP ERP-Supported Procure to Pay Process.- Control Mechanisms in the SAP ERP-Supported Order to Cash Process.- Data Protection Compliance in SAP ERP Human Capital Management.- Fraud in an SAP System.- Excursion: FDA Compliance and Controls in SAP.- Examples of Efficiency-Oriented and Profitability-Oriented Analysis Scenarios in SAP ERP.- PART III — From Concept and Content to Implementation: Automation of an Internal Control System.- ICS Automation: How to Set the COSO Cube in Motion.- ICS Automa-tion Using SAP Process Control.- Implementation of Automated Test and Monitoring Scenarios in the SAP ERP Environment.- Experiences from Practice and Projects.

Fields of interestComputer Appl. in Administrative Data Pro-cessing; Accounting/Auditing; Legal Aspects of Computing

Target groupsProfessional/practitioner

Product categoryHandbook

Due March 2013

2013. XVI, 700 p. 273 illus. Hardcover7 * € (D) 96,29 | € (A) 98,99 | sFr 120,007 € 89,99 | £81.00ISBN 978-3-642-35301-7

9<HTOGPC=dfdabh>

S. Elliott Sim, Many Roads Studios, Toronto, ON, Canada; R. E. Gallardo-Valencia, Intel Corporation, Santa Clara, CA, USA (Eds)

Finding Source Code on the Web for Remix and ReuseContents Introduction: Remixing Snippets and Reusing Components.- Unweaving Code Search toward Remixing-Centered Programming Support.- Archetypal Internet-Scale Source Code Search-ing.- A Controlled Experiment on the Process Used by Developers During Internet-Scale Code Search.- Artifact Representation Techniques for Large-Scale Software Search Engines.- Krugle Code Search Architecture.- Experiences and Les-sons Learned with the Development of a Source Code Search Engine.- Infrastructure for Building Code Search Applications for Developers.- De-veloping Software with Open Source Software Components.- Open Source Reuse and Strategic Imperatives.- Applying Program Analysis to Code Retrieval.- Test-Driven Reuse: Key to Improving Precision of Search Engines for Software Reuse.- Software Problems that Motivate Web Searches.- Novel and Applied Algorithms in a Search Engine for Java Code Snippets.- Facilitating Crowd Sourced Software Engineering via Stack Over-flow.- Intellectual Property Law in Source Code Reuse and Remix.- Richie Boss: Private Investiga-tor Manager.

Fields of interestSoftware Engineering/Programming and Op-erating Systems; User Interfaces and Human Computer Interaction; Information Storage and Retrieval

Target groupsResearch

Product categoryContributed volume

Due May 2013

2013. V, 345 p. 50 illus. Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £85.50ISBN 978-1-4614-6595-9

9<HTMERB=egfjfj>

Page 2: Auditing and GRC Automation Unsupervised …...News 2/2013 Computer Science 77 J. M. Kizza, University of Tennessee at Chattanooga, TN, USA Ethical and Social Issues in the Information

Computer Science springer.com/NEWSonline

76

A. C. Frery, Universidade Federal de Alagoas, Maceió, Brazil; T. Perciano, Universidade de São Paulo, Brazil

Introduction to Image Processing Using RLearning by Examples

This book introduces the statistical software R to the image processing community in an intui-tive and practical manner. R brings interesting statistical and graphical tools which are important and necessary for image processing techniques. Furthermore, it has been proved in the literature that R is among the most reliable, accurate and portable statistical software available. Both the theory and practice of R code concepts and tech-niques are presented and explained, and the reader is encouraged to try their own implementation to develop faster, optimized programs. Those who are new to the field of image processing and to R software will find this work a useful introduction. By reading the book alongside an active R session, the reader will experience an exciting journey of learning and programming.

Features 7 This book introduces the statistical software R in an intuitive and practical manner 7 Presents and explains both the theory and practice of R code concepts and techniques 7 Encourages the reader to try their own implementations to develop faster, optimized programs

Contents Definitions and Notation.- Image Data Formats and Color Representation.- Reading and Writing Images with R: Generating High Quality Output.- Contrast Manipulation.- Filters in the Image Domain.- Contrast Enhancement and Dimension-ality Reduction by Principal.

Fields of interestImage Processing and Computer Vision; Program-ming Languages, Compilers, Interpreters

Target groupsResearch

Product categoryBrief

Due February 2013

2013. XXV, 87 p. 42 illus., 17 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,79 | € (A) 43,99 | sFr 53,507 € 39,99 | £35.99ISBN 978-1-4471-4949-1

9<HTMEPH=bejejb>

M. Gavrilova, University of Calgary, AB, Canada; C. K. Tan, Exascala Ltd., Birmingham, UK (Eds)

Transactions on Computational Science XVIIThe LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innova-tive approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical founda-tions and the applications of large-scale computa-tions and massive data processing.

Features 7 Contains up-to-date research on robotics and cognitive computing 7 Gives detailed coverage of wireless sensor networks security 7 Focuses on modern real-world applications

Contents An Evaluation of Camera Pose Methods for an Augmented Reality System: Application to Teach-ing Industrial Robots.- A Combined Position Evaluation Function in Chinese Chess Computer Game.- Modeling and Analyzing the Human Cog-nitive Limits for Perception in Crowd Simulation.- Progress in Reversible Processor Design: A Novel Methodology for Reversible Carry Look-Ahead Adder.- Secure Congestion Adaptive Routing Using Group Signature Scheme.- Practicability of HFE Scheme for Wireless Sensor Network.- Inter-section Attack on Anonymity in VANET.- Cluster Based RSU Centric Channel Access for VANETs.- Efficient Identity-Based and Authenticated Key Agreement Protocol.

Fields of interestUser Interfaces and Human Computer Interaction; Artificial Intelligence (incl. Robotics); Computer Communication Networks

Target groupsResearch

Product categoryContributed volume

Available

2013. XII, 199 p. 86 illus. (Lecture Notes in Computer Science / Transactions on Computational Science, Volume 7420) Softcover7 * € (D) 67,41 | € (A) 69,30 | sFr 84,007 € 63,00 | £56.99ISBN 978-3-642-35839-5

9<HTOGPC=dfidjf>

M. Haindl, J. Filip, Institute of Information Theory and Automation, Prague, Czech Republic

Visual TextureAccurate Material Appearance Measurement, Representation and Modeling

This book surveys the state of the art in multi-dimensional, physically-correct visual texture modeling.

Features 7 The most comprehensive and advanced over-view of the mathematical approaches to visual sur-face analysis, synthesis, and applications 7 The only book covering all known aspects of the most advanced visual surface representation – the Bidirectional Texture Function (BTF) 7 The first book to provide a detailed treatment of texture synthesis

Contents Motivation.- Representation.- Texture Acquisi-tion.- Static Multispectral Textures.- Dynamic Textures.- Spatially-Varying Bidirectional Re-flectance Distribution Functions.- Bidirectional Texture Functions.- Visualization.- Perceptual Validation and Analysis.- Applications.- Conclu-sions and Open Problems.

Fields of interestImage Processing and Computer Vision; Pattern Recognition; Computer Graphics

Target groupsResearch

Product categoryMonograph

Due February 2013

2013. XXXI, 284 p. 158 illus., 148 in color. (Advances in Computer Vision and Pattern Recognition) Hardcover7 * € (D) 101,60 | € (A) 104,45 | sFr 126,507 € 94,95 | £79.95ISBN 978-1-4471-4901-9

9<HTMEPH=bejabj>

Page 3: Auditing and GRC Automation Unsupervised …...News 2/2013 Computer Science 77 J. M. Kizza, University of Tennessee at Chattanooga, TN, USA Ethical and Social Issues in the Information

News 2/2013 Computer Science

77

J. M. Kizza, University of Tennessee at Chattanooga, TN, USA

Ethical and Social Issues in the Information AgeThis new edition examines the ethical, social, and policy challenges stemming from computing and telecommunication technology, and mobile information-enabling devices.

Features 7 Provides a wide-ranging survey of the impact of new technologies on ethical and social is-sues 7 Written specifically for undergradu-ates 7 Thoroughly revised and enhanced new edition, with new chapters on social networks, mobile telecommunications and virtualization technology

Contents History of Computing.- Morality and the Law.- Ethics and Ethical Analysis.- Ethics and the Pro-fessions.- Anonymity, Security, Privacy, and Civil Liberties.- Intellectual Property Rights and Com-puter Technology.- Social Context of Computing.- Software Issues: Risks and Liabilities.- Computer Crimes.- New Frontiers for Computer Ethics: Artificial Intelligence.- New Frontiers for Com-puter Ethics: Virtualization and Virtual Reality.- New Frontiers for Computer Ethics: Cyberspace and Online Social Networks.- Ethical, Privacy and Security Issues in the Social Network EcoSystems.- Mobile Systems and Intractable Social, Ethical and Security Issues.- Computer Crime Investigations – Computer Forensics.- Biometrics.

Fields of interestComputers and Society; Information Systems Ap-plications (incl. Internet); Data Encryption

Target groupsLower undergraduate

Product categoryUndergraduate textbook

Due April 2013

5th ed. 2013. VII, 400 p. 19 illus., 3 in color. (Texts in Computer Science) Hardcover7 * € (D) 48,14 | € (A) 49,49 | sFr 60,007 € 44,99 | £40.99ISBN 978-1-4471-4989-7

9<HTMEPH=bejijh>

P. Lalanda, Université Joseph Fourier, Grenoble, France; J. A. McCann, Imperial College London, UK; A. Diaconescu, Telecom ParisTech, France

Autonomic ComputingPrinciples, Design and Implementation

This textbook provides a practical perspective on autonomic computing. Through the combined use of examples and hands-on projects, the book enables the reader to rapidly gain an understand-ing of the theories, models, design principles and challenges of this subject while building upon their current knowledge.

Features 7 The first practical guide to autonomic com-puting for advanced students and researchers alike 7 Presents classroom-tested examples and hands-on bounded projects that illustrate the con-cepts in a concrete fashion 7 Provides software for a learning environment for developing, execut-ing and testing autonomic applications

Contents Software Engineering to Autonomic Computing.- Autonomic Systems.- Sources of Inspiration for Autonomic Computing.- Autonomic Computing Architectures.- The Monitoring Function.- The Adaptation Function.- The Decision Func-tion.- Evaluation Issues.- Autonomic Mediation in Cilia.- Future of Autonomic Computing and Conclusions.- Learning Environment.

Fields of interestSoftware Engineering/Programming and Operat-ing Systems; Artificial Intelligence (incl. Robotics); System Performance and Evaluation

Target groupsUpper undergraduate

Product categoryGraduate/Advanced undergraduate textbook

Due May 2013

2013. IX, 298 p. 77 illus., 66 in color. (Undergraduate Topics in Computer Science) Softcover7 * € (D) 42,79 | € (A) 43,99 | sFr 53,507 € 39,99 | £26.99ISBN 978-1-4471-5006-0

9<HTMEPH=bfaaga>

W. Maalej, Technische Universität München, Germany; A. K. Thurimella, Harman Becker, Karlsbad, Germany (Eds)

Managing Requirements KnowledgeFeatures 7 Addresses crucial yet typically neglected is-sues in software projects 7 Written by some of the most renowned researchers in the field with considerable experience 7 Presents both novel theoretical approaches and practical experiences

Contents An Introduction to Requirements Knowledge.- Unpacking Tacit Knowledge for Requirements Engineering.- Mining Requirements Knowledge from Operational Experience.- DUFICE: Guide-lines for a Lightweight Management of Require-ments Knowledge.- Constructing and Using Soft-ware Requirements Patterns.- Using Ontologies and Machine Learning for Hazard Identification and Safety Analysis.- Knowledge-Assisted Ontol-ogy-Based Requirements Evolution.- Reusing Re-quirements in Global Software Engineering.- Per-formative and Lexical Knowledge Sharing in Agile Requirements.- Using Web 2.0 for Stakeholder Analysis: StakeSource and its Application in Ten Industrial Projects.- Resolving Inconsistency and Incompleteness Issues in Software Requirements.- Automated Verification of Variability Model Using First Order Logic.- Model-based Requirements Engineering Framework for Systems Lifecycle Support.- An Overview of Recommender Systems in Requirements Engineering.- Experience based Requirements Engineering Tools.- The Eclipse Requirements Modeling Framework.- Manag-ing Requirements Knowledge: Conclusion and Outlook.

Fields of interestSoftware Engineering; Management of Computing and Information Systems; Artificial Intelligence (incl. Robotics)

Target groupsResearch

Product categoryMonograph

Due April 2013

2013. XII, 310 p. 62 illus., 37 in color. Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £85.50ISBN 978-3-642-34418-3

9<HTOGPC=deebid>

Page 4: Auditing and GRC Automation Unsupervised …...News 2/2013 Computer Science 77 J. M. Kizza, University of Tennessee at Chattanooga, TN, USA Ethical and Social Issues in the Information

Computer Science springer.com/NEWSonline

78

A. Marcus, Aaron Marcus and Associates, Inc., Berkeley, CA, USA

Mobile Persuasion DesignMobile Persuasion Design presents five conceptual design projects (or ‘Machines’) for new mobile ap-plications (smartphone or tablet with Web portals) that combine theories of persuasion and informa-tion design to change people’s behavior. The Green Machine persuades home consumers to save energy. The Health Machine persuades people to change nutrition and exercise habits, so as to avoid obesity/diabetes. The Money Machine persuades baby boomers to improve wealth management and to spend and save appropriately. The Story Machine persuades family members to share more inter-generational stories among families that are geographically distributed and asynchronous, sometimes across multiple countries and cultures. The Innovation Machine persuades entrepre-neurs to practice good design-thinking and adopt innovation practices. The Machines have been published worldwide since 2009. In 2011, the Green, Health, and Money Machines won design awards in an international competition hosted by the International Institute for Information Design, Vienna.

Features 7 Detailed case studies of award-winning designs 7 Shows how to combine persuasion design with information design to change behav-iour 7 Provides detailed competitive analysis of products

Contents Foreword.- Preface.- Contributors.- Introduction.- The Green Machine.- The Health Machine.- The Money Machine.- The Story Machine.- The In-novation Machine.- Index.

Fields of interestComputer Appl. in Social and Behavioral Sciences; Interdisciplinary Studies; Health Promotion and Disease Prevention

Target groupsResearch

Product categoryMonograph

Due May 2013

2013. XX, 300 p. 220 illus. (Computer Supported Cooperative Work) Hardcover7 approx. * € (D) 101,60 | € (A) 104,45 | sFr 126,507 approx. € 94,95 | £85.95ISBN 978-1-4471-4323-9

9<HTMEPH=bedcdj>

New SeriesSpringerBriefs in CybersecurityEditor-in-chief: S. Gaycken, Series editors: S. Kierkegaard, S. J. Murdoch, M. Cova, J. Mallery

Cybersecurity is a difficult and complex field. The technical, political and legal questions surround-ing it are complicated, often stretching a spectrum of diverse technologies, varying legal bodies, different political ideas and responsibilities. Cybersecurity is intrinsically interdisciplinary, and most activities in one field immediately affect the others. Technologies and techniques, strategies and tactics, motives and ideologies, rules and laws, institutions and industries, power and money – all of these topics have a role to play in cybersecurity, and all of these are tightly interwoven. The SpringerBriefs in Cybersecurity series is comprised of two types of briefs: topic- and country-specific briefs. Topic-specific briefs strive to provide a comprehensive coverage of the whole range of topics surrounding cybersecurity, combining whenever possible legal, ethical, social, political and technical issues. Authors with diverse backgrounds explain their motivation, their mind-set, and their approach to the topic, to illuminate its theoretical foundations, the practical nuts and bolts and its past, present and future. Country-specific briefs cover national perceptions and strategies, with officials and national authorities explaining the background, the leading thoughts and interests behind the official statements, to foster a more informed international dialogue.

A. Maurushat, The University of New South Wales, Kensington, NSW, Australia

Disclosure of Security VulnerabilitiesLegal and Ethical Issues

Much debate has been given as to whether com-puter security is improved through the full disclo-sure of security vulnerabilities versus keeping the problems private and unspoken.  Although there is still tension between those who feel strongly about the subject, a middle ground of responsible disclosure seems to have emerged.  Unfortunately, just as we’ve moved into an era with more respon-sible disclosure, it would seem that a market has emerged for security vulnerabilities and zero day exploits. Disclosure of Security Vulnerabilities: Legal and Ethical Issues considers both the ethical and legal issues involved with the disclosure of vulnerabilities and explores the ways in which law might respond to these challenges.

Feature 7 Provides a compelling argument for the in-troduction of security research exemptions to the criminal framework

Contents Foreword.- Introduction.- Types of Disclosure.- Methods of Discovering Security Vulnerabilities.- Criminal Offences: Unauthorised Access, Modi-fication or Interference Comprovisions.- Other Legal and Ethical Issues.- Conclusion.- Glossary of Terms.- Appendix: Comparative Tables.

Fields of interestLegal Aspects of Computing; International IT and Media Law, Intellectual Property Law

Target groupsResearch

Product categoryBrief

Due May 2013

2013. XII, 87 p. 6 illus. (SpringerBriefs in Cybersecurity) Softcover7 * € (D) 42,75 | € (A) 43,95 | sFr 53,507 € 39,95 | £35.99ISBN 978-1-4471-5003-9

9<HTMEPH=bfaadj>

Page 5: Auditing and GRC Automation Unsupervised …...News 2/2013 Computer Science 77 J. M. Kizza, University of Tennessee at Chattanooga, TN, USA Ethical and Social Issues in the Information

News 2/2013 Computer Science

79

M. V. Martinez, University of Oxford, UK; C. Molinaro, Università della Calabria, Rende, Italy; V. Subrahmanian, University of Maryland, College Park, MD, USA; L. Amgoud, IRIT-UPS, Toulouse, France

A General Framework for Reasoning On InconsistencyThis SpringerBrief proposes a general framework for reasoning about inconsistency in a wide variety of logics, including inconsistency resolu-tion methods that have not yet been studied.  The proposed framework allows users to specify preferences on how to resolve inconsistency when there are multiple ways to do so. This empowers users to resolve inconsistency in data leveraging both their detailed knowledge of the data as well as their application needs. The brief shows that the framework is well-suited to handle inconsis-tency in several logics, and provides algorithms to compute preferred options. Finally, the brief shows that the framework not only captures several existing works, but also supports reasoning about inconsistency in several logics for which no such methods exist today.

Contents Introduction and Preliminary Concepts.- A Gen-eral Framework for Handling Inconsistency.- Al-gorithms.- Handling Inconsistency in Monotonic Logics.- Link with Existing Approaches.- Conclu-sions.

Fields of interestArtificial Intelligence (incl. Robotics); Database Management; Logics and Meanings of Programs

Target groupsResearch

Product categoryBrief

Due March 2013

2013. V, 50 p. 1 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,79 | € (A) 43,99 | sFr 53,507 € 39,99 | £35.99ISBN 978-1-4614-6749-6

9<HTMERB=eghejg>

T. Özyer, TOBB University, Ankara, Turkey; K. Kianmehr, University of West Ontario, London, ON, Canada; M. Tan, TOBB University, Ankara, Turkey; J. Zeng, Baylor College of Medicine, Houston, TX, USA (Eds)

Information Reuse and Integration in Academia and IndustryContents Mediators, Concepts and Practice.- A Combina-tion Framework for Exploiting the Symbiotic Aspects of Process and Operational Data in Business Process Optimization.- Efficient Range Query Processing on Complicated Uncertain Data.- Invariant Object Representation Based on Inverse Pyramidal Decomposition and Modi-fied Mellin-Fourier Transform.- Model Checking State Machines Using Object Diagrams.- Mea-suring Stability of Feature Selection Techniques on Real-World Software Datasets.- Analysis and Design: Towards Large-Scale Reuse and Integra-tion of Web User Interface Components.- Which Ranking for Effective Keyword Search Query over RDF Graphs?.- ReadFast: Structural Information Retrieval from Biomedical Big Text by Natural Language Processing.- Multiple Criteria Deci-sion Support for Software Reuse: An Industrial Case Study.- Using Local Principal Components to Explore Relationships Between Heterogeneous Omics Datasets.- Towards Collaborative Foren-sics.- From Increased Availability to Increased Productivity: How Researchers Benefit from On-line Resources.- Integration of Semantics Informa-tion and Clustering in Binary-class Classification for Handling Imbalanced Multimedia Data.

Fields of interestInformation Systems and Communication Service; Organizational Studies, Economic Sociology

Target groupsResearch

Product categoryMonograph

Due April 2013

2013. 500 p. Hardcover7 approx. * € (D) 117,65 | € (A) 120,95 | sFr 146,507 approx. € 109,95 | £99.00ISBN 978-3-7091-1537-4

9<HTOHLJ=bbfdhe>

L. Puig, J. Guerrero, University of Zaragoza, Spain

Omnidirectional Vision SystemsCalibration, Feature Extraction and 3D Information

This work focuses on central catadioptric systems, from the early step of calibration to high-level tasks such as 3D information retrieval. The book opens with a thorough introduction to the sphere camera model, along with an analysis of the relation between this model and actual central catadioptric systems. Then, a new approach to calibrate any single-viewpoint catadioptric camera is described.

Features 7 Presents the first linear method to calibrate all central projection systems and fisheye cam-eras 7 Introduces a generic approach to obtain the scale space of any central projection system, by combining the Riemannian geometry with the sphere camera model 7 Explores the role of hybrid two-view relations to construct robust matching approaches 7 Examines the problem of extracting conics from catadioptric images that represent the projections of straight lines

Contents Modeling Omnidirectional Vision Systems.- Calibration of Omnidirectional Cameras Using a DLT-Like Approach.- Comparison of Calibration Methods for Omnidirectional Cameras.- Two-View Relations Between Omnidirectional and Conventional Cameras.- Generic Scale Space for a Camera Invariant Feature Extractor.- Orientation of a Hand-Held Catadioptric System in Man-Made Environments.- Conclusions.

Fields of interestImage Processing and Computer Vision; Artificial Intelligence (incl. Robotics); Robotics and Auto-mation

Target groupsResearch

Product categoryBrief

Due February 2013

2013. XI, 122 p. 68 illus., 35 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,79 | € (A) 43,99 | sFr 53,507 € 39,99 | £35.99ISBN 978-1-4471-4946-0

9<HTMEPH=bejega>

Page 6: Auditing and GRC Automation Unsupervised …...News 2/2013 Computer Science 77 J. M. Kizza, University of Tennessee at Chattanooga, TN, USA Ethical and Social Issues in the Information

Computer Science springer.com/NEWSonline

80

W. Reisig, Humboldt-Universität zu Berlin, Germany

Understanding Petri NetsModeling Techniques, Analysis Methods, Case Studies

With their intuitive graphical approach and expressive analysis techniques, Petri nets are suit-able for a wide range of applications and teaching scenarios, and they have gained wide acceptance as a modeling technique in areas such as software design and control engineering.

Features 7 Presents essentials of this powerful well-estab-lished modeling technique 7 Includes exercises and fully integrated illustrations 7 Foreword written by the inventor of the technique

Contents Part I Modeling Techniques.- Chap. 1 An Example.- Chap. 2 The Basic Concepts.- Chap. 3 Common Special Case: Elementary System Nets.- Chap. 4 Sequential and Distributed Runs.- Chap. 5 Scenarios.- Chap. 6 Further Notation for Elementary System Nets.- Chap. 7 The Synthesis Problem.- Chap. 8 Composition of Nets.- Part II Analysis Methods.- Chap. 9 State Proper-ties.- Chap. 10 Traps and Co-traps of Elemen-tary System Nets.- Chap. 11 Place Invariants of Elementary System Nets.- Chap. 12 Combining Traps and Place Invariants of Elementary System Nets.- Chap. 13 Traps and Place Invariants of Ge-neric System Nets.- Chap. 14 Marking and Cover-ing Graphs.- Chap. 15 Reachability in Elementary System Nets.- Chap. 16 Run Properties.- Chap. 17 Free-Choice Nets.- Chap. 18 Marked Graphs.- Chap. 19 Well-Formed System Nets.- Part III Case Studies.- Chap. 20 Mutual Exclusion.- Chap. 21 Asynchronous Hardware.

Fields of interestTheory of Computation; Software Engineering/Programming and Operating Systems; Computing Methodologies

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Available

2013. Approx. 230 p. Hardcover7 approx. * € (D) 53,45 | € (A) 54,95 | sFr 66,507 approx. € 49,95 | £44.99ISBN 978-3-642-33277-7

9<HTOGPC=ddchhh>

K. K. Shukla, Banaras Hindu University, Varanasi, India; A. K. Tiwari, GE India Technology Center, Bangalore, India

Efficient Algorithms for Discrete Wavelet TransformWith Applications to Denoising and Fuzzy Inference Systems

Due to its inherent time-scale locality character-istics, the discrete wavelet transform (DWT) has received considerable attention in signal/image processing. Wavelet transforms have excellent energy compaction characteristics and can provide perfect reconstruction. The shifting (translation) and scaling (dilation) are unique to wavelets. Orthogonality of wavelets with respect to dilations leads to multigrid representation. As the com-putation of DWT involves filtering, an efficient filtering process is essential in DWT hardware implementation.

Features 7 Describes a mathematical model to predict the errors introduced in the implementation of the discrete wavelet transform (DWT) on fixed-point processors 7 Explores the application of DWT on benchmark signals and images in terms of denoising 7 Proposes a modified threshold selection and thresholding scheme

Contents Introduction.- Filter Banks and DWT.- Finite Precision Error Modeling and Analysis.- PVM Implementation of DWT-Based Image Denois-ing.- DWT-Based Power Quality Classification.- Conclusions and Future Directions.

Fields of interestImage Processing and Computer Vision; Signal, Image and Speech Processing; Algorithm Analysis and Problem Complexity

Target groupsResearch

Product categoryBrief

Due February 2013

2013. VII, 117 p. 46 illus., 31 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,79 | € (A) 43,99 | sFr 53,507 € 39,99 | £35.99ISBN 978-1-4471-4940-8

9<HTMEPH=bejeai>

D. B. Skillicorn

Understanding High-Dimensional SpacesHigh-dimensional spaces arise as a way of model-ling datasets with many attributes. Such a dataset can be directly represented in a space spanned by its attributes, with each record represented as a point in the space with its position depending on its attribute values. Such spaces are not easy to work with because of their high dimensional-ity: our intuition about space is not reliable, and measures such as distance do not provide as clear information as we might expect.

Features 7 High-dimensional spaces arise naturally as a way of modelling datasets with many attri-butes 7 Author suggests new ways of think-ing about high-dimensional spaces using two models 7 Valuable for practitioners, graduate students and researchers

Contents Introduction.- Basic Structure of High-Dimen-sional Spaces.- Algorithms.- Spaces with a Single Center.- Spaces with Multiple Clusters.- Represen-tation by Graphs.- Using Models of High-Dimen-sional Spaces.- Including Contextual Informa-tion.- Conclusions.- Index.- References.

Fields of interestInformation Systems and Communication Service; Data Structures, Cryptology and Information Theory; Computing Methodologies

Target groupsProfessional/practitioner

Product categoryBrief

Available

2012. IX, 108 p. 29 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,75 | € (A) 43,95 | sFr 53,507 € 39,95 | £35.99ISBN 978-3-642-33397-2

9<HTOGPC=dddjhc>

Page 7: Auditing and GRC Automation Unsupervised …...News 2/2013 Computer Science 77 J. M. Kizza, University of Tennessee at Chattanooga, TN, USA Ethical and Social Issues in the Information

News 2/2013 Computer Science

81

B. Vitoriano, J. Montero, Universidad Complutense Madrid, Spain; D. Ruan, Belgian Nuclear Research Centre, Mol, Belgium (Eds)

Decision Aid Models for Disaster Management and EmergenciesFeatures 7 Provides a general framework for disaster man-agement 7 Contains various decisions analysis theories and support tools in complex systems in general and in disaster management in particu-lar 7 Includes disaster management approaches for both natural and technological disasters

Contents On the Use of Information in Humanitarian Operations.- Decision Aid Models and Systems for Humanitarian Logistics. A Survey.- Uncertainty in Humanitarian Logistics for Disaster Man-agement.- Fuzzy inference systems for disaster response.- Security Based Operation in Container Line Supply Chain.- A Linguistic-Valued Informa-tion Processing Method for Fuzzy Risk Analysis.- A Belief Rule-Based Generic Risk Assessment Framework.- Fuzzy semantics in closed domain question answering.- Decision Making with Ex-tensions of Fuzzy Sets.- Classification of Disasters and Emergencies under Bipolar Knowledge Repre-sentation.- A Network Transshipment Model for Planning Humanitarian Relief Operations after a Natural Disaster.- A Travel Behaviour Study through Learning and Clustering of Fuzzy Cogni-tive Maps.- Fire and explosion safety assessment in container line supply chain.- A Human Situation Awareness Support System to Avoid Technological Disasters.

Fields of interestSimulation and Modeling; Computer Applications; Operation Research/Decision Theory

Target groupsResearch

Product categoryContributed volume

Due January 2013

2013. XV, 325 p. 58 illus., 31 in color. (Atlantis Computational Intelligence Systems, Volume 7) Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £85.50ISBN 978-94-91216-73-2

9<HTUEUB=cbghdc>

W. Wang, Beijing Institute of Technology, P.R. of China; G. Wets, Hasselt University, Diepenbeek, Belgium (Eds)

Computational Intelligence for Traffic and MobilityThis book presents the new development of computation intelligence for traffic, transportation and mobility, the main contents include traffic safety, mobility analysis, intelligent transportation system, smart vehicle, transportation behavior, driver modeling and assistance, transportation risk analysis and reliability system analysis, vehicle operation and active safety, urban traffic manage-ment and planning.

Feature 7 This book should be most suitable to the senior undergraduate students and graduate students, and to those in computation intelligence system, traffic, transportation and mobility profession who need to solve problems on the analysis, design, plan, operation, control and management of traf-fic, transportation and mobility system by use of new theory, method of computation intelligence The emphasis on this book will be placed on fundamental concepts and principles of theory, models and methods of computation intelligence studies, and analytical and computational skills of transportation and mobility system analysis and control Numerous step-by-step tutorials help the reader to learn the book quickly

Fields of interestInformation Systems and Communication Service; Simulation and Modeling

Target groupsResearch

Product categoryContributed volume

Available

2013. XI, 337 p. 118 illus., 55 in color. (Atlantis Computational Intelligence Systems, Volume 8) Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £85.50ISBN 978-94-91216-79-4

9<HTUEUB=cbghje>

J. Weaver, W. Gao, S. Chin, D. Iverson, J. Vos

Pro JavaFX 2A Definitive Guide to Rich Clients with Java Technology

In Pro JavaFX 2: A Definitive Guide to Rich Clients with Java Technology, Jim Weaver, Weiqi Gao, Stephen Chin, Dean Iverson, and Johan Vos show you how you can use the JavaFX platform to create rich-client Java applications. You‘ll see how JavaFX provides a powerful Java-based UI plat-form capable of handling large-scale data-driven business applications. Covering the JavaFX API, development tools, and best practices, this book provides code examples that explore the exciting new features provided with JavaFX 2. It contains engaging tutorials that cover virtually every facet of JavaFX development and reference materials on JavaFX that augment the JavaFX API documenta-tion. Written in an engaging and friendly style, Pro JavaFX 2 is an essential guide to JavaFX 2.

Feature 7 One of the first books on the open source JavaFX 2.x Platform Promises to be a definitive in scope, written by JavaFX experts and some insiders JavaFX 2 is comparable to Silverlight 3 and established Adobe Flash RIA remains an im-portant and fairly hot meme in today&#146;s Web developer market

Field of interestComputer Science, general

Target groupsPopular/general

Product categoryMonograph

Available

2012. 640 p. Softcover7 * € (D) 48,14 | € (A) 49,49 | sFr 60,007 € 44,99 | £39.49ISBN 978-1-4302-6872-7

9<HTMEOA=cgihch>

Page 8: Auditing and GRC Automation Unsupervised …...News 2/2013 Computer Science 77 J. M. Kizza, University of Tennessee at Chattanooga, TN, USA Ethical and Social Issues in the Information

Computer Science springer.com/NEWSonline

82

H. Wen, University of Electronic Science and Technology of China, Chengdu, China

Physical Layer Approaches for Securing Wireless Communication SystemsThis book surveys the outstanding work of physical-layer (PHY) security, including  the recent achievements of confidentiality and au-thentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated.  Also discussed is a scheme which combines crypto-graphic techniques implemented in the higher layer with the physical layer security approach using redundant antennas of MIMO systems to provide stronger security for wireless networks. The channel responses between communication peers have been explored as a form of fingerprint with spatial and temporal uniqueness. Finally, the book develops a new lightweight method of chan-nel identification for Sybil attack and node clone detection in wireless sensor networks (WSNs).

Contents Introduction for PHY Security.- Unconditional Security Wireless Communication.- MIMO Based Enhancement for Wireless Communication Security.- Physical Layer Assisted Authentication for Wireless Sensor Networks.- Detection of Node Clone and Sybil Attack Based on CI Approach.

Fields of interestComputer Communication Networks; Communi-cations Engineering, Networks; Systems and Data Security

Target groupsResearch

Product categoryBrief

Due April 2013

2013. VIII, 84 p. 53 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 42,79 | € (A) 43,99 | sFr 53,507 € 39,99 | £35.99ISBN 978-1-4614-6509-6

9<HTMERB=egfajg>

S. Živný, University of Oxford, UK

The Complexity of Valued Constraint Satisfaction ProblemsThe topic of this book is the following optimisa-tion problem: given a set of discrete variables and a set of functions, each depending on a subset of the variables, minimise the sum of the functions over all variables.

Features 7 Presents general methods for analysing the complexity of optimisation problems cast as valued constraint satisfaction problems (VC-SPs) 7 Suitable for researchers interested in methods and results from the area of constraint programming and discrete optimisation 7 Relat-ed thesis received ACP (Association for Constraint Programming) Doctoral Award

Contents Chap. 1 Introduction.- Chap. 2 Background.- Chap. 3 Expressibility of Valued Constraints.- Chap. 4 Expressibility of Fixed-Arity Lan-guages.- Chap. 5 Expressibility of Submodular Languages.- Chap. 6 Non-expressibility of Submodular Languages.- Chap. 7 Tractable Lan-guages.- Chap. 8  Conservative Languages.- Chap. 9 The Power of Linear Programming.- Chap. 10 Hybrid Tractability.- Chap. 11 Summary and Open Problems.- References.- Index.

Fields of interestTheory of Computation; Artificial Intelligence (incl. Robotics); Mathematical Logic and Founda-tions

Target groupsResearch

Product categoryMonograph

Available

2012. XVII, 170 p. 23 illus. (Cognitive Technologies) Hardcover7 * € (D) 90,90 | € (A) 93,45 | sFr 113,507 € 84,95 | £76.50ISBN 978-3-642-33973-8

9<HTOGPC=ddjhdi>


Recommended