This book deals with one of the most novel advances in mathematical modeling for applied scientific technology, including computer graphics, public-key encryption, data visualization, statistical data analysis, symbolic calculation, encryption, error correcting codes, and risk management.
This book provides an overview of the many approaches that can adopted for programming and deploying highly-adaptive and large-scale IoT systems, with a specific focus on the key results achieved within the Fluidware research project.
Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.
Artificial Intelligence in Forensic Science addresses the current and emerging opportunities being utilized to apply modern Artificial Intelligence (AI) technologies to current forensic and investigation practices.
Immer wieder hört man von Hackerangriffen, sei es, um geheime Informationen abzugreifen, Institutionen zu erpressen oder Unternehmen gezielt zu schaden.
Examining how victimisation can occur across the online-offline continuum while emphasising the need for a holistic approach to understanding and addressing contemporary harms, this book covers various themes of victimisation in the digital age linked to the interconnectedness and blurred boundaries between online and offline experiences.
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door for cybercriminals to penetrate hospital networks.
Die Fantasie der Menschen beim Schmuggeln geheimer Daten ist nahezu grenzenlos: Ein im Schuhabsatz versteckter Mikrofilm, das Tarnen einer Spionagenachricht als Zigarrenbestellung, das Schreiben mit Geheimtinte, das Verbergen von Daten in harmlosen Bildern und Zinken- Codes – dies sind nur einige von unzähligen Beispielen für versteckte Botschaften.
In the ever-evolving landscape of digital forensics and cybercrime investigation, staying ahead with the latest advancements is not just advantageous-it's imperative.
The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand of IT which has taken an extraordinarily long time to come to fruition within the mainstream.
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.
Das User Interface, auf dem Benutzeraktionen und -eingaben, beispielsweise zur Authentifizierung auf einer Webseite, getätigt werden, ist ein beliebtes Ziel für Cyberkriminelle, um Zugangsdaten zu erlangen.
Over the past three years, the landscape of blockchain technology has undergone remarkable transformation, extending far beyond its association with cryptocurrencies especially with the emergence of Web3 applications.
This book, authored by some of the pioneers in the security certification domain, provides a foundational knowledge base for designing and deploying effective security certification schemes for cloud-edge distributed systems.