Large-scale data loss and data privacy compliance breaches continue to make headline news, highlighting the need for stringent data protection policies, especially when personal or commercially sensitive information is at stake.
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries.
This book constitutes the refereed proceedings of the 8th International Conference on Cognitive Computing, ICCC 2024, Held as Part of the Services Conference Federation, SCF 2024, held in Bangkok, Thailand, during November 16-19, 2024.
This book discusses the main legal and economic challenges to the creation and enforcement of security rights in intellectual property and explores possible avenues of reform, such as more specific rules for security in IP rights and better coordination between intellectual property law and secured transactions law.
This book constitutes the proceedings of the International Conference on Web of Services, ICWS 2020, held virtually as part of SCF 2020, in Honolulu, HI, USA, in September 2020.
This two-volume set CCIS 2264 and CCIS 2265 constitutes the refereed proceedings of the 6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024, held in Hangzhou, China, during July 12-14, 2024.
The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills.
Handbook on Augmenting Telehealth Services: Using Artificial Intelligence provides knowledge of AI-empowered telehealth systems for efficient healthcare services.
This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques.
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018.
Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.
In einer Welt, die zunehmend von digitalen Technologien geprägt ist, gewinnt das IT-Audit eine Schlüsselrolle in der Sicherung von Daten, Prozessen und Compliance.
In the age of global climate change, society will require cities that are environmentally self-sufficient, able to withstand various environmental problems and recover quickly.
The subject of Artificial Intelligence (AI) is continuing on its journey of affecting each and every individual and will keep on this path in the times to come.
The book aims to showcase the basics of both IoT and Blockchain for beginners as well as their integration and challenge discussions for existing practitioner.
The subjects of Privacy and Data Protection are more relevant than ever with the European General Data Protection Regulation (GDPR) becoming enforceable in May 2018.
Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of intruder alarm systems.
This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing.
This book provides a thorough exploration of the intersection between gender-based healthcare disparities and the transformative potential of artificial intelligence (AI) and machine learning (ML).
As design continues to impact our products, services, and solutions at scale, it is more important than ever to understand the systems and context that surround design decisions.
This two-volume set CCIS 2264 and CCIS 2265 constitutes the refereed proceedings of the 6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024, held in Hangzhou, China, during July 12-14, 2024.
Records Managers have tended to find themselves given the responsibility for managing requests under the Freedom of Information (FOI) and Data Protection Acts (DPA), without necessarily having training and/or an academic background in legal studies.
This book constitutes the refereed proceedings of the 8th International Conference on Cognitive Computing, ICCC 2024, Held as Part of the Services Conference Federation, SCF 2024, held in Bangkok, Thailand, during November 16-19, 2024.
This book constitutes the refereed proceedings of the 9th International Conference on on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016.
Government and Information: The Law Relating to Access, Disclosure and their Regulation is the leading text offering comprehensive and practical advice on the access, disclosure and retention of government records under UK, EU and ECHR requirements.
Network Optimization in Intelligent Internet of Things Applications: Principles and Challenges sheds light on the optimization methods that form the basis of effective communication between networked devices.
This book is a collection of the best research papers presented at the First World Conference on Internet of Things: Applications & Future (ITAF 2019), Sponsored by GR Foundation and French University in Egypt, held at Triumph Luxury Hotel, Cairo, Egypt, on 14-15 October 2019.
In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible.
This book aims to highlight the gaps and the transparency issues in the clinical research and trials processes and how there is a lack of information flowing back to researchers and patients involved in those trials.