This book provides an introduction to the basic ideas involved in cybersecurity, whose principal aim is protection of IT systems against unwanted behaviour mediated by the networks which connect them.
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets.
This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts.
In the ever-evolving landscape of technology, emerging innovations like artificial intelligence (AI), blockchain, quantum computing, brain-computer interfaces (BCIs), and the Metaverse are transforming industries at an unprecedented rate.
Professionelle Hackerangriffe (sogenannte Advanced Persistent Threats) treffen heutzutage Regierungen, Unternehmen und sogar kritische Infrastrukturen wie Flughäfen oder Stromnetzbetreiber.
This volume constitutes the proceedings of the 26th International Conference on Web Services, ICWS 2019, held as part of SCF 2019 in San Diego, CA, USA in June 2019.
Tools and technologies have long complemented and extended our physical abilities: from pre-historic spearheads to steam-propelled ploughs and high-tech prosthetics.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
This book constitutes the proceedings of the 28th International Conference on Web Services, ICWS 2021, held virtually as part of SCF 2021, during December 10-14, 2021.
The official report that has shaped the international debate about NSA surveillance"e;We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking.
This handbook explores smart cities of the future, provides an understanding of their development and management systems, and discusses the technology challenges.
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xi'an, China, during October 25-28, 2024.
Many governments around the world are calling for the use of biometric systems to provide crucial societal functions, consequently making it an urgent area for action.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
This book focuses on the integration of blockchain technology for IoT systems, exploring the methodologies behind each component of the system to bolster the data security and protect privacy.
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door for cybercriminals to penetrate hospital networks.
This book looks at the integration of blockchain technology in healthcare settings, focusing on its potential to address security and privacy concerns of medical applications.
The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle.
A quick, easy-to-read synthesis of theory, guidelines, and evidence-based research, this book offers timely, practical guidance for library and information professionals who must navigate ethical crises in information privacy and stay on top of emerging privacy trends.
Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali LinuxKey FeaturesEfficiently perform penetration testing techniques on your public cloud instancesLearn not only to cover loopholes but also to automate security monitoring and alerting within your cloud-based deployment pipelinesA step-by-step guide that will help you leverage the most widely used security platform to secure your AWS Cloud environmentBook DescriptionThe cloud is taking over the IT industry.
Published in association with the Society of American Archivists Trusting Records in the Cloud presents key findings of InterPARES Trust, an international research project that has investigated issues of trust in, and trustworthiness of records and data online, with respect to privacy, accessibility, portability, metadata and ownership.