著者:Aamo Iorliam
出版社: Springer International Publishing
発売日: 2019年03月15日
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country’s……続きを見る
This book examines how cryptocurrencies based on blockchain technologies fit into existing general law categories of public and private law. The book takes the common law systems of the United Kingd……続きを見る
The winner of the 2020 British Insurance Law Association Book Prize, this timely, expertly written book looks at the legal impact that the use of 'Big Data' will have on the provision – and substant……続きを見る
Primera obra colectiva en España sobre el nuevo Reglamento Europeo de Protección de Datos, donde se ofrece un profundo análisis sobre cada uno de los aspectos más relevantes del Derecho europeo de p……続きを見る
出版社: Springer International Publishing
発売日: 2019年03月21日
This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.
The 31 full……続きを見る
著者:David Kaye
出版社: Columbia Global Reports
発売日: 2019年06月03日
“David Kaye’s book is crucial to understanding the tactics, rhetoric and stakes in one of the most consequential free speech debates in human history.” ーCory Doctorow
The internet was designed to b……続きを見る
This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to sto……続きを見る
出版社: Springer International Publishing
発売日: 2019年03月30日
This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018.
The 7 full papers presented in thi……続きを見る
With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a ch……続きを見る
In 64 THINGS YOU NEED TO KNOW NOW FOR THEN, Editor-at-Large for Wired magazine and guru of the digital age Ben Hammersley gives us the essential guide to the things we need to know for life in the 2……続きを見る
The twelfth Inspector Rebus bestseller - a powerfully gripping novel where past and present collide...
From the No.1 bestselling author of A SONG FOR THE DARK TIMES
'This is, quite simply, crime wri……続きを見る
出版社: Springer International Publishing
発売日: 2019年04月08日
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijin……続きを見る
出版社: Springer International Publishing
発売日: 2019年04月08日
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijin……続きを見る
This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assist fraud examiners and auditors in c……続きを見る
This book describes the need of copyright protection for multimedia objects and develops an invisible image watermarking scheme to serve the purpose of copyright protection. Here intelligent systems……続きを見る
著者:Stefan Strauß
出版社: Taylor & Francis
発売日: 2019年04月17日
This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age.
Privacy is among ……続きを見る
著者:Alana Maurushat
出版社: University of Ottawa Press
発売日: 2019年04月18日
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely ……続きを見る
A disruption in your call center operation can conceivably cost you hundreds of thousands of dollars. And multiple disruptions can cost in the millions. Call Center Continuity Planning shows you how……続きを見る
Depuis le 25 mai 2018, le Règlement Général sur la Protection des Données (RGPD) protège les informations privées des citoyens. Ce manuel vise à éclairer et guider les organisations dans la compréhe……続きを見る
Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation.
Yet, Cybersecuri……続きを見る
The concept of privacy has long been confused and incoherent. The right to privacy has been applied promiscuously to an alarmingly wide-ranging assortment of issues including free speech, political ……続きを見る
Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical syst……続きを見る
There is really no doubt that humans are the greatest generator of trash in the world - trash in the form of domestic and industrial wastes, trash in the form of written and media garbage and trash ……続きを見る
Expirience the injustice of the Department of Justice through the tales of many Sex Offenders, and how one small mistake can ruin the rest of your life.
続きを見る
出版社: Springer International Publishing
発売日: 2019年06月15日
The ever-increasing use of technology is challenging the current status of the law, bringing about new problems and questions. The book addresses this trend from the perspective of International law……続きを見る
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Uni……続きを見る
This book provides a critical overview of the changing ways people mourn, commemorate and interact with the remains of the dead, including bodies, materials and digital artefacts. It focuses on how ……続きを見る
Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019
In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and ……続きを見る
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cybe……続きを見る
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Se……続きを見る