This is the first book to finally address the umbrella term corporate defense, and to explain how an integrated corporate defense program can help an organization address both value creation and preservation.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective.
This book highlights the state-of-the-art research on data usage, security, and privacy in the scenarios of the Internet of Things (IoT), along with related applications using Machine Learning and Big Data technologies to design and make efficient Internet-compatible IoT systems.
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures(R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things.
Although it has influenced the field of Human-Computer Interaction (HCI) since its origins, humanistic HCI has come into its own since the early 2000s.
Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data-if that is indeed possible.
Legal Analytics: The Future of Analytics in Law navigates the crisscrossing of intelligent technology and the legal field in building up a new landscape of transformation.
The book provides a comprehensive overview of biometrics, including its theoretical foundations and practical applications, and offers valuable insights into its relevance and impact on various sectors of society.
"e;The Biometric Computing: Recognition & Registration"e; presents introduction of biometrics along with detailed analysis for identification and recognition methods.
This book investigates the goals and policy aspects of cyber security education in the light of escalating technical, social and geopolitical challenges.
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies.
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes.
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end.
The internet has launched the world into an era into which enormous amounts of data aregenerated every day through technologies with both positive and negative consequences.
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs).
Handbook of Usability and User Experience: Methods and Techniques is concerned with emerging usability and user experience in design concepts, theories and applications of human factors knowledge focusing on the discovery, design and understanding of human interaction and usability issues with products and systems for their improvement.
Reach more customers and grow your business with today's most powerful marketing tool: Word-of-MouthHighly Recommended shows the impact of customer recommendations on businesses--transforming how people buy, how you reach customers, how you improve products, and ultimately how you can grow your company by leveraging the power of recommendations.
"e;Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability.
This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it.
The four-volume set LNCS 11334-11337 constitutes the proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018.
Artificial intelligence (AI) is increasingly impacting many aspects of people's lives across the globe, from relatively mundane technology to more advanced digital systems that can make their own decisions.
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "e;learn-by-doing"e; approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security.