This book looks at the integration of blockchain technology in healthcare settings, focusing on its potential to address security and privacy concerns of medical applications.
Blockchain and Digital Twin Applications in Smart Agriculture presents scenarios, solutions, applications to optimize crop management, improve resource allocation, and enhance sustainability in modern farming practices.
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks.
From the streets of London to subway stations in New York City, hundreds of thousands of surveillance cameras ubiquitously collect hundreds of thousands of videos, often running 24/7.
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important.
Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, the process for doing so, and a methodology to follow.
The Institute of Electrical and Electronics Engineers (IEEE) Communications Society designed the IEEE wireless communication engineering technologies (WCET) certification program to address the wireless industry's growing need for communications professionals with practical problem-solving skills in real-world situations.
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state.
Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions.
Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions.
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions and stealthily executed cyber crimes.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field.
Blinded by emotional rhetoric, political posturing, and genuine fear, previous efforts to defend our way of life against aggressors intent on inflicting personal and economic destruction have proven, in hindsight, to be misguided, panicked, and reactionary.
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats.