The book presents timely and needed contributions on privacy and data protection seals as seen from general, legal, policy, economic, technological, and societal perspectives.
In this book, the protection of personal data is compared for eight EU member states,namely France, Germany, the United Kingdom, Ireland, Romania, Italy, Sweden andthe Netherlands.
This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains.
The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012.
Focused on fundamental concepts and practical applications, this book provides a strong foundation in the principles and terminology of computer networking and internet technology.
This book presents a comprehensive exploration of quantum computing, exploring its wide-ranging applications across industries, elucidating its transformative impact on diverse sectors, and addressing the forthcoming challenges and future directions within this rapidly evolving field.
With all of the vital personal and business data being shared on computer networks every day, security has become one of the most essential aspects of networking.
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model.
A large international conference on Advances in Machine Learning and Systems Engineering was held in UC Berkeley, California, USA, October 20-22, 2009, under the auspices of the World Congress on Engineering and Computer Science (WCECS 2009).
Based on a corpus of private email from Jamaican university students, this study explores the discourse functions of Jamaican Creole in computer-mediated communication.
Text-based interaction among humans connected via computer networks, such as takes place via email and in synchronous modes such as "e;chat"e;, MUDs and MOOs, has attracted considerable popular and scholarly attention.
¿Qué pasaría si le dijera que hay una manera súper simple y rápida de aprender lo básico de la Cryptomoneda y empezar a operar e invertir en unos pocos minutos sin siquiera aprender nada técnico?
In passato, l’arte della “scrittura nascosta” (meglio nota come crittografia) era per lo più riferita ad un insieme di metodi per nascondere il contenuto di un dato messaggio agli occhi di lettori non autorizzati.
This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and dedicated this year to the theme "e;Trustworthy Internet"e;.
Il volume ha a oggetto sia gli attuali criteri di distribuzione dei contenuti audiovisivi digitali sia gli emergenti problemi per gli utenti finali non più semplici consumatori ma anche produttori di informazione.
Le livre de piratage est destiné à servir de guide de niveau intermédiaire à certains outils et compétences de test de pénétration courants, en particulier ceux du piratage sans fil et du maintien de l'anonymat.
With the increased concern for energy conservation in recent years, much attention has been focused on lighting energy consumption and methods for reducing it.
Project management is truly an art seeking science with complex processes balancing project output objectives against restraints of time, budget, human resources, quality, and customer satisfaction.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
ALL THE KNOWLEDGE YOU NEED TO BUILD CYBERSECURITY PROGRAMS AND POLICIES THAT WORK Clearly presents best practices, governance frameworks, and key standards Includes focused coverage of healthcare, finance, and PCI DSS compliance An essential and invaluable guide for leaders, managers, and technical professionals Today, cyberattacks can place entire organizations at risk.
Project management is truly an art seeking science with complex processes balancing project output objectives against restraints of time, budget, human resources, quality, and customer satisfaction.
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence In an era where artificial intelligence can create content indistinguishable from reality, how do we separate truth from fiction?
Colección de artículos de Antonio Rodríguez de las Heras, Catedrático de la Universidad Carlos III de Madrid y Director del Instituto de Cultura y Tecnología de la misma, en torno a la evolución de la tecnología dentro de los centros educativos.
Es habitual escuchar que la Iglesia debe cambiar su lenguaje para comunicarse con las personas, que las palabras y las formas que utiliza son anticuadas.
Los drones de cuatro rotores o cuadricópteros son una clase especial de VANT (Vehículo Aéreo No Tripulado) y son uno de los avances tecnológicos de frontera que hoy son parte de la vida cotidiana.
GuíaBurros: Redes Locales es una guía con todo lo que debes saber para montar una red local, desde que es una LAN, pasando por la configuración de la misma, hasta las herramientas que se pueden utilizar para la seguridad y uso de la red.
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India.
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India.
This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19-21, 2013.