The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources.
The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources.
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology.
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics.
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed.
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed.
Cypherpunk Ethics explores the moral worldview of the cypherpunks, a movement that advocates the use of strong digital cryptography-or crypto, for short-to defend individual privacy and promote institutional transparency in the digital age.
Cypherpunk Ethics explores the moral worldview of the cypherpunks, a movement that advocates the use of strong digital cryptography-or crypto, for short-to defend individual privacy and promote institutional transparency in the digital age.
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide.
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide.
"e;Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability.
"e;Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability.
Deep Fakes: Algorithms and Society focuses on the use of artificial intelligence technologies to produce fictitious photorealistic audiovisual clips that are indistinguishable from traditional video media.
Deep Fakes: Algorithms and Society focuses on the use of artificial intelligence technologies to produce fictitious photorealistic audiovisual clips that are indistinguishable from traditional video media.
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.
Democratic Frontiers: Algorithms and Society focuses on digital platforms' effects in societies with respect to key areas such as subjectivity and self-reflection, data and measurement for the common good, public health and accessible datasets, activism in social media and the import/export of AI technologies relative to regime type.
Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics.
Privacy: Algorithms and Society focuses on encryption technologies and privacy debates in journalistic crypto-cultures, countersurveillance technologies, digital advertising, and cellular location data.
Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics.
Privacy: Algorithms and Society focuses on encryption technologies and privacy debates in journalistic crypto-cultures, countersurveillance technologies, digital advertising, and cellular location data.
Democratic Frontiers: Algorithms and Society focuses on digital platforms' effects in societies with respect to key areas such as subjectivity and self-reflection, data and measurement for the common good, public health and accessible datasets, activism in social media and the import/export of AI technologies relative to regime type.
Digital Totalitarianism: Algorithms and Society focuses on important challenges to democratic values posed by our computational regimes: policing the freedom of inquiry, risks to the personal autonomy of thought, NeoLiberal management of human creativity, and the collapse of critical thinking with the social media fueled rise of conspiranoia.
Digital Totalitarianism: Algorithms and Society focuses on important challenges to democratic values posed by our computational regimes: policing the freedom of inquiry, risks to the personal autonomy of thought, NeoLiberal management of human creativity, and the collapse of critical thinking with the social media fueled rise of conspiranoia.
This groundbreaking book filters down the wealth of information on cybersecurity to the most relevant and highly applicable aspects for coaches, therapists, researchers and all other practitioners handling confidential client conversations and data.
This groundbreaking book filters down the wealth of information on cybersecurity to the most relevant and highly applicable aspects for coaches, therapists, researchers and all other practitioners handling confidential client conversations and data.
A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services.
A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services.
In the age of global climate change, society will require cities that are environmentally self-sufficient, able to withstand various environmental problems and recover quickly.
In the age of global climate change, society will require cities that are environmentally self-sufficient, able to withstand various environmental problems and recover quickly.