The information security arena is often vague and confusing for internet users, both young and old. New traps are being devised daily, and falling into them can take legal, ethical, financial, physi……続きを見る
著者:Carsten Adrian
出版社: Peter Lang GmbH, Internationaler Verlag der Wissenschaften
発売日: 2024年11月26日
Übermittlungen personenbezogener Daten zwischen Stellen der deutschen öffentlichen Verwaltung sind originär nationale Vorgänge. Gleichwohl unterliegen sie weitgehend den EU-Datenschutzsekundärrechts……続きを見る
Rethinking Justice in the Age of AI, Self-Litigation, and Legal Power Plays
What happens when a lone self-litigant faces off against corporate titans armed with armies of high-priced lawyers? In thi……続きを見る
The two-volume set IFIP AICT 721 + 722 constitutes the proceedings of the 18th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2024, held in Skövd……続きを見る
The two-volume set IFIP AICT 721 +722 constitutes the proceedings of the 18th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2024, held in Skövde……続きを見る
Existing laws have a generality that permits them to be applied to nanotechnology, but eventually it will be necessary to generate legislation targeted to issues specific to nanotechnology. As nanot……続きを見る
Covering 17 Asian jurisdictions – representing differing stages in the development of data protection regulatory systems – this book offers an in-depth, cross-jurisdictional commentary on the develo……続きを見る
This book examines the intersection between cybersecurity and the law and economy of India and offers a course of action in designing efficacious policies against emerging cybercrimes in the country……続きを見る
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the……続きを見る
This book presents a fresh perspective on combating cyber crime, showcasing innovative solutions from experts across various fields. With the integration of artificial intelligence (AI), contemporar……続きを見る
This book critically assesses legal frameworks involving the bulk processing of personal data, initially collected by the private sector, to predict and prevent crime through advanced profiling tech……続きを見る
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and……続きを見る
The security criteria of the International Standards Organization (ISO) provides an excellent foundation for identifying and addressing business risks through a disciplined security management proce……続きを見る
The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape. Cyber Investigations of Smart Devices provid……続きを見る
Federated machine learning is a novel approach to combining distributed machine learning, cryptography, security, and incentive mechanism design. It allows organizations to keep sensitive and privat……続きを見る
As a legal professional in the 21st century, you have to figure out how to stand out from the crowd. Times have changed, and it has never been this difficult for legal professionals to cut through t……続きを見る
著者:Julie Mehan
出版社: IT Governance Publishing
発売日: 2024年12月12日
In an era characterised by the remarkable growth of AI, there emerges a profound ethical dimension that demands our attention. This book presents a timely and significant addition to the ongoing dis……続きを見る
著者:Hwihong Kim
出版社: Peter Lang GmbH, Internationaler Verlag der Wissenschaften
発売日: 2024年12月03日
Der Open Government-Ansatz zielt darauf ab, Verwaltungsprozesse so zu gestalten, dass externes Expertenwissen und die Kreativität der Bürger in politisch-administrative Entscheidungsfindungen einbez……続きを見る
著者:Hedi Nasheri
出版社: Taylor & Francis
発売日: 2024年12月30日
This book provides a holistic overview of the complexities of modern technological advances and their implications for crime and security. It examines the societal dilemmas that accompany these tech……続きを見る
In the third edition of this popular reference, identity management specialist Marlin B. Pohlman offers a definitive guide for corporate stewards struggling with the challenge of meeting regulatory ……続きを見る
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subs……続きを見る
Legal professionals, who work in areas where law, science, and technology converge, don't need a PhD to effectively represent their clients, but they do need a grounding in how science and technolog……続きを見る
This guide demonstrates how to secure sensitive data and comply with internal and external audit regulations using Oracle 10g and 11g. It provides the hands-on guidance required to understand the co……続きを見る
Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with s……続きを見る
To configure and maintain an operating system is serious business. With UNIX and its wide variety of "flavors," it can be especially difficult and frustrating, and networking with UNIX adds still mo……続きを見る
This volume assembles hundreds of cases and studies to provide the most accurate and comprehensive picture of the status of pornography in the criminal justice system. Presenting high-level research……続きを見る
A digital twin represents the indistinguishable digital counterpart of the physical object to simulate, monitor and test with real time synchronization. This book presents the framework and importan……続きを見る
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things ……続きを見る
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need……続きを見る
This book contains product specific information based on Cisco router command line interface, and IBM's Net view. It is designed to help us understand the "parts and pieces" of communications and de……続きを見る