This reference text provides the theoretical foundations, the emergence, and the application areas of Blockchain in an easy-to-understand manner that would be highly helpful for the researchers, academicians, and industry professionals to understand the disruptive potentials of Blockchain.
The text focuses on the basics of Python programming fundamentals and introduction to present-day applications in technology and the upcoming state-of-art trends in a comprehensive manner.
The text focuses on the basics of Python programming fundamentals and introduction to present-day applications in technology and the upcoming state-of-art trends in a comprehensive manner.
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology.
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology.
Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens.
Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens.
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security.
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security.
Managing the Insider Threat: No Dark Corners and the Rising Tide Menace, Second Edition follows up on the success of - and insight provided by - the first edition, reframing the insider threat by distinguishing between sudden impact and slow onset (aka "e;rising tide"e;) insider attacks.
Managing the Insider Threat: No Dark Corners and the Rising Tide Menace, Second Edition follows up on the success of - and insight provided by - the first edition, reframing the insider threat by distinguishing between sudden impact and slow onset (aka "e;rising tide"e;) insider attacks.
This book provides important new insights into social issues in the rapidly growing field of esports, filling a gap in the literature that has, until now, been dominated by business and management perspectives.
This book provides important new insights into social issues in the rapidly growing field of esports, filling a gap in the literature that has, until now, been dominated by business and management perspectives.
Legal Analytics: The Future of Analytics in Law navigates the crisscrossing of intelligent technology and the legal field in building up a new landscape of transformation.
Legal Analytics: The Future of Analytics in Law navigates the crisscrossing of intelligent technology and the legal field in building up a new landscape of transformation.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
The 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among others.
The 21st century has been host to a number of information systems technologies in the areas of science, automotive, aviation and supply chain, among others.
If you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets.
Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform).
This book brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence in a single volume to build insight into their use in sustainable living.
This book brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence in a single volume to build insight into their use in sustainable living.