This book critically examines the subjective value of privacy in the context of state surveillance, exploring how individuals assess costs and benefits of surveillance.
Technological and scientific progress, especially the rapid development in information technology (IT) and artificial intelligence (AI), plays a crucial role regarding questions of peace and security.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technolo
The book presents high-quality, peer-reviewed papers from 3rd International Conference on "e;Universal Threats in Expert Applications and Solutions"e; (UNI-TEAS 2024), jointly being organized by IES University, Bhopal, and Shree KKarni Universe College, Jaipur, in association with CSI Jaipur Chapter and Jaipur ACM Professional Chapter during January 6-9, 2024.
The book presents high-quality, peer-reviewed papers from 3rd International Conference on "e;Universal Threats in Expert Applications and Solutions"e; (UNI-TEAS 2024), jointly being organized by IES University, Bhopal, and Shree KKarni Universe College, Jaipur, in association with CSI Jaipur Chapter and Jaipur ACM Professional Chapter during January 6-9, 2024.
Offering hundreds of tips, templates, checklists, and pointers to information in the public domain, Business Resumption Planning, Second Edition assists you in creating a rock solid recovery plan for any size organization.
Cloud and Fog Optimization-based Solutions for Sustainable Developments discusses the integration of fog computing and the Internet of Things to provide scalable, secure, and cost-effective digital infrastructures for smart services in diverse domains: Highlights resource management solutions for the Internet of Things devices in fog computing architectures Discusses waste management using cloud and fog computing for sustainable development, and optimization of the Internet of Things in fog computing for fault tolerance Covers smart surveillance and monitoring using cloud and fog computing, and energy-efficient smart healthcare Explains energy-efficient frameworks for cloud-fog environments for sustainable development, and smart grid infrastructure using cloud and fog computing Presents the management of metropolitan mobility for public transport and smart vehicles with cloud and fog computing The text is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communications engineering, computer science and engineering, and information technology.
In a rapidly evolving world where technology is increasingly integrated into our daily lives, security has become a top priority for individuals, organizations, and governments.
By enabling the conversion of traditional manufacturing systems into contemporary digitalized ones, Internet of Things (IoT) adoption in manufacturing creates huge economic prospects through reshaping industries.
Navigate the complex landscape of Artificial Intelligence (AI) governance and model risk management using a holistic approach encompassing people, processes, and technology.
Navigate the complex landscape of Artificial Intelligence (AI) governance and model risk management using a holistic approach encompassing people, processes, and technology.
Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to understand the cyber security landscape.
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels.
Wussten Sie, dass die häufigsten Cloud-Sicherheitsbedrohungen auf Fehlkonfigurationen von Cloud-Diensten und nicht auf Angriffe von außen zurückzuführen sind?