Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, and emerge equipped with the skills to build resilient applicationsKey FeaturesExplore the practical application of secure software development methodologiesModel security vulnerabilities throughout the software development lifecycle (SDLC)Develop the skills to trace requirements, from requirements gathering through to implementationPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionExtend your software development skills to integrate security into every aspect of your projects.
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and business rules (processes and procedures).
This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.
This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going beyond the security of networks to the ubiquitous mobile communications and online social networks that have become part of daily life.
This handbook explores smart cities of the future, provides an understanding of their development and management systems, and discusses the technology challenges.
Absolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the emerging Ethereum ecosystem, from the basics of how its blockchain works to cutting-edge applications.
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and business rules (processes and procedures).
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This books brings readers a holistic understanding of blockchain adoption in healthcare by not only considering the technical fundamentals of use cases, but also the regulatory, informational and organizational challenges and solutions.
The history of computer-aided face recognition dates to the 1960s, yet the problem of automatic face recognition - a task that humans perform routinely and effortlessly in our daily lives - still poses great challenges, especially in unconstrained conditions.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This books brings readers a holistic understanding of blockchain adoption in healthcare by not only considering the technical fundamentals of use cases, but also the regulatory, informational and organizational challenges and solutions.
With the recent debacle of cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of comprehending the security and regulations of Web3, cryptocurrency, and blockchain projects has been magnified.
Emergency managers and public safety professionals are more frequently being called on to address increasingly challenging and complex critical incidents, with a wider variety and intensity of hazards, threats, and community vulnerabilities.
This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices.
This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices.
Emergency managers and public safety professionals are more frequently being called on to address increasingly challenging and complex critical incidents, with a wider variety and intensity of hazards, threats, and community vulnerabilities.
Discussing social media-related scholarship found in criminology, legal studies, policing, courts, corrections, victimization, and crime prevention, this book presents the current state of our knowledge on the impact of social media and the major sociological frameworks employed to study the U.
The subject of Artificial Intelligence (AI) is continuing on its journey of affecting each and every individual and will keep on this path in the times to come.