Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life.
The book is a collection of the best-selected research papers presented at the International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications (ICMISC 2023) held in September 2023 at the CMR Institute of Technology, Hyderabad, Telangana, India.
The fourth industrial revolution challenges humanity ethically and morally: mass unemployment, new forms of colonialism, and mass-and-granular surveillance are a few examples of these challenges.
Cybersecurity refers to the set of technologies, practices, and strategies designed to protect computer systems, networks, devices, and data from unauthorized access, theft, damage, disruption, or misuse.
This book focuses on the global landscape in which insurance is transacted, and where it is evolving, driven from within by transformative technologies and externally by the necessity to address risks like climate change and health crises, such as the COVID-19 pandemic.
Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality.
Cybersecurity and Human Rights in the Age of Cyberveillance isa collection of articles by distinguished authors from the US and Europe and presents a contemporary perspectives on the limits online of human rights.
Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries.
Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments.
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use.
Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions.
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography and Security provides easy, intuitive access to information on all aspects of cryptography and security.
Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices.
Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications.
Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability, science and health-care from the physical world to the virtual world.
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research.
In the 1970s and 1980s West Germany was a pioneer in both the use of the new information technologies for population surveillance and the adoption of privacy protection legislation.
This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage.
This timely and compelling book presents a broad study of all key cyber security issues of the highest interest to government and business as well as their implications.
This important reference work is an extensive resource for students who want to investigate the world of cybercrime or for those seeking further knowledge of specific attacks both domestically and internationally.
Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise.
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "e;what"e; but also addressing the "e;why"e; behind China's focus on establishing information dominance as a key component of its military efforts.
Even though terrorism poses an increasing threat to multinational companies, corporate leaders can thwart attacks by learning to navigate the complexities of foreign governments, social unrest, and cultural dissonance.
Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government-international, national, state, and local.
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective.
Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis.
The Definitive Handbook on Terrorist Threats to Commercial Airline and Airport SecurityConsidered the definitive handbook on the terrorist threat to commercial airline and airport security, USAF Lieutenant Colonel Kathleen Sweet's seminal resource is now updated to include an analysis of modern day risks.
Reflecting the diverse and specialized nature of the security industry, this volume provides an up-to-date treatment of a topic that has become increasingly complex as more vulnerabilities arise.
Approximately 80 percent of the worlds population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime.
This book provides an overview of economic espionage as practiced by a range of nations from around the world focusing on the mass scale in which information is being taken for China's growth and development.
Global criminology is an emerging field covering international and transnational crimes that have not traditionally been the focus of mainstream criminology or criminal justice.