Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents.
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents.
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance.
This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications.
This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications.
Systemic-structural activity theory (SSAT), founded by Gregory Bedny, is a relatively new unified framework for the study of efficiency of human performance, equipment, and software design.
Systemic-structural activity theory (SSAT), founded by Gregory Bedny, is a relatively new unified framework for the study of efficiency of human performance, equipment, and software design.
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises.
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises.
This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection.
This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection.
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP.
In an era where advanced technology plays a critical role in maintaining national security, Artificial Intelligence for Military Applications with Blockchain investigates how combining AI and blockchain could transform military operations.
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP.
The internet has launched the world into an era into which enormous amounts of data aregenerated every day through technologies with both positive and negative consequences.
The internet has launched the world into an era into which enormous amounts of data aregenerated every day through technologies with both positive and negative consequences.
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources.
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources.
"e;The Biometric Computing: Recognition & Registration"e; presents introduction of biometrics along with detailed analysis for identification and recognition methods.
"e;The Biometric Computing: Recognition & Registration"e; presents introduction of biometrics along with detailed analysis for identification and recognition methods.
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs).
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs).
On the back of their last book, Cyber-risk and Youth, and building on a new research project, Adorjan and Ricciardelli marshal current research to explore parenting in the digital age.
This book examines the effect of Information Technology on our lives, illustrating how a lack of proper social control over IT has led to a scene of technological wizardry and real everyday gains, contaminated by discrimination, deprivation and unacceptable ethical standards.
From AI ethics and cybersecurity to augmented realities, virtual interfaces, and much more, Futureshock provides an accessible introduction to the leading edge topics of today.
This book aims to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to the management of risks related to all third party arrangements and emphasises that organisations retain accountability for business activities, functions and services outsourced to a third party.
The Internet and the many applications it supports continue to transform and expand the ways in which it is possible to relate, communicate, collaborate, and perform human service work.
The Internet and the many applications it supports continue to transform and expand the ways in which it is possible to relate, communicate, collaborate, and perform human service work.
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing.