Este libro es producto del desarrollo de actividades de investigación de un proyecto sobre gestión de televisión digital, el cual consigna la información referente a la iniciativa de Gestión / GESTV, que define todo el conjunto de funciones de gestión, y donde se discriminan los componentes de la red de T-Learning y se identifican las capas de gestión a las cuales pertenecen.
Prepare for success on the IAPP CIPP/US exam and further your career in privacy with this effective study guide - now includes a downloadable supplement to get you up to date on the current CIPP exam effective September 2025!
Durante las dos últimas décadas, el mundo ha sido testigo decómo la protección jurídica debida a las creaciones del talentohumano se encuentra en crisis, dada la expansión global delas telecomunicaciones a través de Internet.
The book presents timely and needed contributions on privacy and data protection seals as seen from general, legal, policy, economic, technological, and societal perspectives.
In this book, the protection of personal data is compared for eight EU member states,namely France, Germany, the United Kingdom, Ireland, Romania, Italy, Sweden andthe Netherlands.
This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains.
The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012.
Focused on fundamental concepts and practical applications, this book provides a strong foundation in the principles and terminology of computer networking and internet technology.
This book presents a comprehensive exploration of quantum computing, exploring its wide-ranging applications across industries, elucidating its transformative impact on diverse sectors, and addressing the forthcoming challenges and future directions within this rapidly evolving field.
With all of the vital personal and business data being shared on computer networks every day, security has become one of the most essential aspects of networking.
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model.
A large international conference on Advances in Machine Learning and Systems Engineering was held in UC Berkeley, California, USA, October 20-22, 2009, under the auspices of the World Congress on Engineering and Computer Science (WCECS 2009).
Text-based interaction among humans connected via computer networks, such as takes place via email and in synchronous modes such as "e;chat"e;, MUDs and MOOs, has attracted considerable popular and scholarly attention.
¿Qué pasaría si le dijera que hay una manera súper simple y rápida de aprender lo básico de la Cryptomoneda y empezar a operar e invertir en unos pocos minutos sin siquiera aprender nada técnico?
In passato, l’arte della “scrittura nascosta” (meglio nota come crittografia) era per lo più riferita ad un insieme di metodi per nascondere il contenuto di un dato messaggio agli occhi di lettori non autorizzati.
This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and dedicated this year to the theme "e;Trustworthy Internet"e;.
Il volume ha a oggetto sia gli attuali criteri di distribuzione dei contenuti audiovisivi digitali sia gli emergenti problemi per gli utenti finali non più semplici consumatori ma anche produttori di informazione.
Le livre de piratage est destiné à servir de guide de niveau intermédiaire à certains outils et compétences de test de pénétration courants, en particulier ceux du piratage sans fil et du maintien de l'anonymat.
With the increased concern for energy conservation in recent years, much attention has been focused on lighting energy consumption and methods for reducing it.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence In an era where artificial intelligence can create content indistinguishable from reality, how do we separate truth from fiction?
Los drones de cuatro rotores o cuadricópteros son una clase especial de VANT (Vehículo Aéreo No Tripulado) y son uno de los avances tecnológicos de frontera que hoy son parte de la vida cotidiana.
GuíaBurros: Redes Locales es una guía con todo lo que debes saber para montar una red local, desde que es una LAN, pasando por la configuración de la misma, hasta las herramientas que se pueden utilizar para la seguridad y uso de la red.
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India.
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India.