First published in 1998, this volume contains essays from leading thinkers on both sides of the Atlantic on the relationship between law and science. Science plays an ever-increasing part in the dev……続きを見る
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive appro……続きを見る
The Internet has created a formidable challenge for human rights law and practice worldwide. International scholarly and policy-oriented communities have so far established a consensus regarding onl……続きを見る
Mobile phones are widely viewed as the information and communication technology that holds the most promise for bridging global digital divides.
Gendered Power and Mobile Technology uses empirical r……続きを見る
Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization……続きを見る
著者:Danny Steed
出版社: Taylor & Francis
発売日: 2018年08月15日
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern i……続きを見る
The rise and spread of the Internet has accelerated the global flows of money,
technology and information that are increasingly perceived as a challenge to the
traditional regulatory powers of natio……続きを見る
The IoT is the next manifestation of the Internet. The trend started by connecting computers to computers, progressed to connecting people to people, and is now moving to connect everything to every……続きを見る
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses mul……続きを見る
This book explores the use of Lightweight Directory Access Protocol (LDAP) as an efficient protocol. It combines all of the relevant information available on the Internet along with a number of argu……続きを見る
This volume enables security professionals to structure the best security program designed to meet the complex needs of an entire organization, taking into account the organization's business goals ……続きを見る
出版社: Springer International Publishing
発売日: 2019年06月17日
This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019.
The 18 ……続きを見る
I casi giudiziari, in particolare gli omicidi, hanno sempre suscitato grande interesse nell’opinione pubblica. Negli ultimi anni, tuttavia, il dibattito e il confronto tra “innocentisti” e “colpevol……続きを見る
Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infras……続きを見る
著者:Kalpana Tyagi
出版社: Springer Berlin Heidelberg
発売日: 2019年06月21日
This book addresses the question of how competition authorities assess mergers in the Information Communication Technology (ICT) sector so as to promote competition in innovation. A closer look at t……続きを見る
Na atual Era da Informação, os comportamentos humanos são cada vez mais mediados por ações tecnológicas. Algoritmos, sensores, conectividade, tratamento de Big Data, Inteligência Artificial e comput……続きを見る
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worm……続きを見る
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the ……続きを見る
著者:Mario Martini
出版社: Springer Berlin Heidelberg
発売日: 2019年07月03日
Dieses Buch liefert eine rechtswissenschaftliche Analyse der Chancen und Gefahren algorithmenbasierter Verfahren. Algorithmen, die im Maschinenraum moderner Softwareanwendungen werkeln, sind zu zent……続きを見る
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self……続きを見る
The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: D……続きを見る
Dieses Buch liefert ein Rahmenwerk zur Zertifizierung von Services in der Cloud. Herzstück dabei ist ein umfangreicher Kriterienkatalog zum Assessment von Cloud-Services, der im Forschungsprojekt „V……続きを見る
Blockchain is no longer just about bitcoin or cryptocurrencies in general. Instead, it can be seen as a disruptive, revolutionary technology which will have major impacts on multiple aspects of our ……続きを見る
Cyber-risks are moving targets and societal responses to combat cyber-victimization are often met by the distrust of young people. Drawing on original research, this book explores how young people d……続きを見る
出版社: Springer International Publishing
発売日: 2019年07月18日
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York,……続きを見る
出版社: Springer International Publishing
発売日: 2019年07月18日
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York,……続きを見る
This two-volume set (CCIS 1045 and CCIS 1046) constitutes the refereed proceedings of the Third International Conference on Advances in Computing and Data Sciences, ICACDS 2019, held in Ghaziabad, I……続きを見る
Less than a decade after the Financial Crisis, we are witnessing the fast emergence of a new financial order driven by three different, yet interconnected, dynamics: first, the rapid application of ……続きを見る
The Audit Value Factor: Making Management’s Head Turn empowers readers with a systematic method to build and maintain a value-centric internal audit organization. The book explores how to identify, ……続きを見る
This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in th……続きを見る