This textbook analyses the origins and effects of insider risk, using multiple real-life case histories to illustrate the principles, and explains how to protect organisations against the risk.
This textbook analyses the origins and effects of insider risk, using multiple real-life case histories to illustrate the principles, and explains how to protect organisations against the risk.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems.
A quick, easy-to-read synthesis of theory, guidelines, and evidence-based research, this book offers timely, practical guidance for library and information professionals who must navigate ethical crises in information privacy and stay on top of emerging privacy trends.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 - 18 December 2022.
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems.
This book has a multidisciplinary approach to Metaverse studies and the relevance of Metaverse with the current and popular topics that concern society and how it will change them in the future.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 - 18 December 2022.
This book has a multidisciplinary approach to Metaverse studies and the relevance of Metaverse with the current and popular topics that concern society and how it will change them in the future.
Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government-international, national, state, and local.
This book draws readers' attention to the financial aspects of daily life at a corporation by combining a robust mathematical setting and the explanation and derivation of the most popular models of the firm.
Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige Reaktion im Krisenfall und die Möglichkeiten zur Prävention.
This book draws readers' attention to the financial aspects of daily life at a corporation by combining a robust mathematical setting and the explanation and derivation of the most popular models of the firm.
Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige Reaktion im Krisenfall und die Möglichkeiten zur Prävention.
This proceedings volume convenes selected, revised papers presented at the 52nd Southeastern International Conference on Combinatorics, Graph Theory and Computing (SEICCGTC 2021), virtually held at Florida Atlantic University in Boca Raton, USA, on March 8-12, 2021.
This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Risk Assessment and Risk-driven Testing, RISK 2013, held in conjunction with 25th IFIP International Conference on Testing Software and Systems, ICTSS 2013, in Istanbul, Turkey, in November 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Security, Privacy and Trust in a Digital World, e-Democracy 2013, held in Athens, Greece, December 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Trustworthy Global Computing, TGC 2013, held in Buenos Aires, Argentina, in August 2013.
This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Barcelona, Spain, in October 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced Applications, CARDIS 2013, held in Berlin, Germany, in November 2013.
The book is a collection of peer-reviewed best-selected research papers presented at the International Conference on Advances in IoT and Security with AI (ICAISA 2023), organized by Deen Dayal Upadhyaya College, University of Delhi, New Delhi, India, in collaboration with University of Canberra, Canberra, Australia, and NIT, Arunachal Pradesh, Itanagar, AP, India, during March 24-25, 2023.
The book is a collection of peer-reviewed best-selected research papers presented at the International Conference on Advances in IoT and Security with AI (ICAISA 2023), organized by Deen Dayal Upadhyaya College, University of Delhi, New Delhi, India, in collaboration with University of Canberra, Canberra, Australia, and NIT, Arunachal Pradesh, Itanagar, AP, India, during March 24-25, 2023.
The book is a collection of peer-reviewed best-selected research papers presented at the International Conference on Advances in IoT and Security with AI (ICAISA 2023), organized by Deen Dayal Upadhyaya College, University of Delhi, New Delhi, India, in collaboration with University of Canberra, Canberra, Australia, and NIT, Arunachal Pradesh, Itanagar, AP, India, during March 24-25, 2023.
The book is a collection of peer-reviewed best-selected research papers presented at the International Conference on Advances in IoT and Security with AI (ICAISA 2023), organized by Deen Dayal Upadhyaya College, University of Delhi, New Delhi, India, in collaboration with University of Canberra, Canberra, Australia, and NIT, Arunachal Pradesh, Itanagar, AP, India, during March 24-25, 2023.