By imparting crucial insights into the digital evolution of far-right extremism and its challenges, this book explores how far-right extremism has transformed, utilising digital spaces for communication and employing coded language to evade detection.
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.
A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology.
This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018.
There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal.
The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces.
The Construction of Truth in Contemporary Media Narratives about Risk provides a theoretical framework for how, in a post-truth era, media audiences are able to understand and navigate everyday risk.
An essential reference for scholars and others whose work brings them into contact with managing, policing and regulating online behaviour, the Handbook of Internet Crime emerges at a time of rapid social and technological change.
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies.
This book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linkoping, Sweden, in September 2019.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
Focusing on the phenomenon of terrorism in the age of ISIS/ISIL, Terrorism and Counterterrorism investigates this form of political violence in an international and American context and in light of new and historical trends.
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security.
This book constitutes the refereed proceedings of the 14th EAI International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2022, which was held in Zanzibar, Tanzania, in December 2022.
Phishing for Nazis is an evidence-based, undercover study of neo-Nazi communities on anonymous communication platforms that helps to shine a light on the dark web.
Drahtlose Netzwerke sind heute allgegenwärtig und werden im Zuge von Entwicklungen wie dem "Smart Home" und dem "Internet of Things" in Zukunft eine noch wichtigere Schlüsselrolle bei der Informationsvermittlung spielen.
The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape.
In einer Welt, die zunehmend digitaler wird, mag das Internet manchmal, wie ein unübersichtlicher Dschungel voller Informationen und Möglichkeiten erscheinen.
On the back of their last book, Cyber-risk and Youth, and building on a new research project, Adorjan and Ricciardelli marshal current research to explore parenting in the digital age.
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security.
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security.
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems.
Das Problem der fragmentierten IT Sicherheit: Informationssicherheit und deren Normen und Standards (BSI Grundschutz, ISO27001, weitere) sowie IT-Sicherheit (Technik und Betrieb) sollen zukünftig besser verzahnen.
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts.
In an increasingly interconnected and digital world, this book provides comprehensive guidance on cybersecurity leadership specifically tailored to the context of public policy and administration in the Global South.