Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is a valuable resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security.
Identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.
Features a comprehensive discussion on the trending topics and emergent research in IT security and governance. This publication highlights theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management.
Examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organisations. Highlighting socio-ethical issues, policy implementation, and appropriate usage, this book is a reference source for professionals, policy makers, academics, managers, and students interested in the security implications of wearable digital devices.
Provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures. This publication takes a broad perspective, from network security, surveillance, reconnaissance, and physical security. This book provides an in-depth look into the threats facing modern society and the methods to avoid them.
Presents the latest developments in block chain innovation and their application in contractual agreements. Highlighting pivotal discussions on topics such as cryptography, programming techniques, and decentralized computing, this book is an ideal publication for researchers, academics, professionals, students, and practitioners.
Presents the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary financial systems. Presenting emerging techniques to secure these systems against potential threats and highlighting theoretical foundations and real-world case studies, this book is ideally designed for professionals, practitioners, upper-level students, and technology developers.
Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is designed for academics, researchers, engineers and students.
A comprehensive reference source for the latest scholarly perspectives on counter measures and related methods to enhance security and protection against criminal activities online. This publication highlights a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests.
Provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academics, students, and researchers.
Presents the latest scholarly research on the various types of unauthorized access or damage to electronic data. This publication features extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, and is designed for academics, researchers, computer engineers, graduate students, and practitioners.
Presents the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensive coverage on relevant areas such as kinetic knowledge, cognitive analytics, and parallel computing, this publication is an ideal resource for professionals, researchers, academics, advanced-level students, and technology developers in the field of big data.
Presents the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is designed for students, researchers, scientists, and engineers.
As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats.
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Improving Information Security Practices through Computation Intelligence presents an overview of the latest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection.
Discusses the security and optimization of computer networks for use in a variety of disciplines and fields. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.
Presents the latest scholarly research on the need for an effective chain of information management and clear principles of information technology governance. Including extensive coverage on a broad range of topics such as compliance programs, data leak prevention, and security architecture, this book is ideally designed for IT professionals, scholars, researchers, and academics.
Explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding.
Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.
Explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications.
Combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academics are presented with lessons learned by international experts to meet the new challenges of security in the global information age.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.