Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Presents the latest developments in block chain innovation and their application in contractual agreements. Highlighting pivotal discussions on topics such as cryptography, programming techniques, and decentralized computing, this book is an ideal publication for researchers, academics, professionals, students, and practitioners.
Explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is a valuable resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security.
Identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.
Features a comprehensive discussion on the trending topics and emergent research in IT security and governance. This publication highlights theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management.
Examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organisations. Highlighting socio-ethical issues, policy implementation, and appropriate usage, this book is a reference source for professionals, policy makers, academics, managers, and students interested in the security implications of wearable digital devices.
Provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures. This publication takes a broad perspective, from network security, surveillance, reconnaissance, and physical security. This book provides an in-depth look into the threats facing modern society and the methods to avoid them.
In a digital context, trust is a multifaceted concept, including trust in application usability, trust in information security, and trust in fellow users. Mobile technologies have compounded the impact of such considerations. This title explores current advances in digital and mobile computing technologies from the user perspective, evaluating trust models and autonomic trust management.
Presents the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary financial systems. Presenting emerging techniques to secure these systems against potential threats and highlighting theoretical foundations and real-world case studies, this book is ideally designed for professionals, practitioners, upper-level students, and technology developers.
Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is designed for academics, researchers, engineers and students.
A comprehensive reference source for the latest scholarly perspectives on counter measures and related methods to enhance security and protection against criminal activities online. This publication highlights a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests.
Provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academics, students, and researchers.
Presents the latest scholarly research on the various types of unauthorized access or damage to electronic data. This publication features extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, and is designed for academics, researchers, computer engineers, graduate students, and practitioners.
Presents the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensive coverage on relevant areas such as kinetic knowledge, cognitive analytics, and parallel computing, this publication is an ideal resource for professionals, researchers, academics, advanced-level students, and technology developers in the field of big data.
Presents the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is designed for students, researchers, scientists, and engineers.
Discusses the evolution and current trends in cryptology, and offers new insight into how to use strategic algorithms to aid in solving intricate difficulties within this domain. This volume features topics such as hash functions, homomorphic encryption schemes, two party computation, and integer factoring,.
Addresses the fact that managing information security programmes while effectively managing risks has never been so critical. This book contains 24 chapters on the most relevant and important issues and advances in applied information security management. The chapters are authored by leading researchers and practitioners in the field of information security from across the globe.
Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.
As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats.
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Improving Information Security Practices through Computation Intelligence presents an overview of the latest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection.
Discusses the security and optimization of computer networks for use in a variety of disciplines and fields. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.
Offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.