Αυτό το καινοτόμο βιβλίο του Samuel Stein εξερευνά το ταχέως εξελισσόμενο τοπίο του ψηφιακού δικαίου και τον αντίκτυπό του στην παγκόσμια κοινωνία. Σε μια εποχή που καθορίζεται από την τεχνολογική κ……続きを見る
This book presents the impact and scope of Internet of Things (IoT), Artificial Intelligence (AI), and Machine Learning (ML) in the growth of intelligent digital farming and smart agriculture. It of……続きを見る
Activity, Behavior, and Healthcare Computing relates to the fields of vision and sensor-based human action or activity and behavior analysis and recognition. As well as a series of methodologies, th……続きを見る
The rapid and tumultuous technological transformation of our societies has triggered a self-exploratory public debate about what it means to be human. What are our human potential, talents, and powe……続きを見る
The conference on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresss between scholars, scientists and engineers all ov……続きを見る
A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and ……続きを見る
The concept of the metaverse signifies the forthcoming stage of development of the Internet, wherein it will facilitate the creation of virtual worlds that are enduring, decentralized, and capable o……続きを見る
Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Fillin……続きを見る
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to……続きを見る
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using……続きを見る
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions and stealthily executed cyber crimes. Featuring cont……続きを見る
According to the Brookings Institute, an organization's information and other intangible assets account for over 80 percent of its market value. As the primary sponsors and implementers of informati……続きを見る
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards……続きを見る
Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professiona……続きを見る
Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, t……続きを見る
The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Prepar……続きを見る
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, under……続きを見る
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity. Authored by cybersecurit……続きを見る
In Book 3, fifth and sixth graders are maturing, becoming more independent, and online activities are second nature. From Street‑smart to Web‑wise®: A Cyber Safety Training Manual Built for Teachers……続きを見る
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citi……続きを見る
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilit……続きを見る
The Institute of Electrical and Electronics Engineers (IEEE) Communications Society designed the IEEE wireless communication engineering technologies (WCET) certification program to address the wire……続きを見る
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has crea……続きを見る
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems du……続きを見る
The Certified Information Security Manager(CISM) certification program was developed by the Information Systems Audit and Controls Association (ISACA). It has been designed specifically for experien……続きを見る
著者:Jerry Iannacci
出版社: Taylor & Francis
発売日: 2024年09月19日
Access Device Fraud and Related Financial Crimes offers front-line exposure. It is a reference text that affords the student, financial investigator or law enforcement professional a true insight in……続きを見る
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on……続きを見る
Guide to Optimal Operational Risk and Basel II presents the key aspects of operational risk management that are also aligned with the Basel II requirements. This volume provides detailed guidance fo……続きを見る
User identification and authentication are absolutely essential to modern security. Mechanics of User Identification and Authentication presents the general philosophy of user authentication and acc……続きを見る
Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including stud……続きを見る