While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls.
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "e;learn-by-doing"e; approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security.
Researching an individual's, firm's or brands online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement.
Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules.
This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture.
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical.
Cybercrime has become increasingly prevalent in the new millennium as computer-savvy criminals have developed more sophisticated ways to victimize people online and through other digital means.
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and business rules (processes and procedures).
Healthcare systems globally are grappling with how best to implement effective and efficient patient-centred care while simultaneously trying to contain runaway costs and provide high quality.
This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture.
This handbook explores smart cities of the future, provides an understanding of their development and management systems, and discusses the technology challenges.
Absolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the emerging Ethereum ecosystem, from the basics of how its blockchain works to cutting-edge applications.
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and business rules (processes and procedures).
Healthcare systems globally are grappling with how best to implement effective and efficient patient-centred care while simultaneously trying to contain runaway costs and provide high quality.
Decentralized Autonomous Organizations (DAOs) constitute a comparatively novel area in academic research and scholarship, but the budding interest in this category of digital and algorithmic organization across various disciplines provides an indication of the possibilities that DAOs wield in terms of informing and advancing our understanding of the potentialities of the digital economy's forthcoming iterations.
Currently, computational intelligence approaches are utilised in various science and engineering applications to analyse information, make decisions, and achieve optimisation goals.
Emergency managers and public safety professionals are more frequently being called on to address increasingly challenging and complex critical incidents, with a wider variety and intensity of hazards, threats, and community vulnerabilities.
Delving into the deeply enigmatic nature of Artificial Intelligence (AI), AI: Unexplainable, Unpredictable, Uncontrollable explores the various reasons why the field is so challenging.
Delving into the deeply enigmatic nature of Artificial Intelligence (AI), AI: Unexplainable, Unpredictable, Uncontrollable explores the various reasons why the field is so challenging.
Emergency managers and public safety professionals are more frequently being called on to address increasingly challenging and complex critical incidents, with a wider variety and intensity of hazards, threats, and community vulnerabilities.
The subject of Artificial Intelligence (AI) is continuing on its journey of affecting each and every individual and will keep on this path in the times to come.
Machine learning, Internet of Things (IoT) and data analytics are new and fresh technologies that are being increasingly adopted in the field of medicine.