Many governments around the world are calling for the use of biometric systems to provide crucial societal functions, consequently making it an urgent area for action.
This book explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape due to the extraordinary circumstances triggered by the COVID-19 pandemic.
This book explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape due to the extraordinary circumstances triggered by the COVID-19 pandemic.
Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data provides a detailed insight on how to reap the benefits of blockchain technology in healthcare, as the healthcare sector faces several challenges associated with privacy and security issues.
Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data provides a detailed insight on how to reap the benefits of blockchain technology in healthcare, as the healthcare sector faces several challenges associated with privacy and security issues.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role.
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.
The quantity, diversity, and sophistication of Internet of Things (IoT) items are rapidly increasing, posing significant issues but also innovative solutions for forensic science.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life.
Handbook of Usability and User Experience: Methods and Techniques is concerned with emerging usability and user experience in design concepts, theories and applications of human factors knowledge focusing on the discovery, design and understanding of human interaction and usability issues with products and systems for their improvement.
Handbook of Usability and User Experience: Methods and Techniques is concerned with emerging usability and user experience in design concepts, theories and applications of human factors knowledge focusing on the discovery, design and understanding of human interaction and usability issues with products and systems for their improvement.
This volume of the Handbook of Usability and User Experience (UX) presents research and case studies used to design products, systems and environments with good usability and consequent acceptance, pleasure in use, good user experience, and understanding of human interaction issues with products and systems for their improvement.
This volume of the Handbook of Usability and User Experience (UX) presents research and case studies used to design products, systems and environments with good usability and consequent acceptance, pleasure in use, good user experience, and understanding of human interaction issues with products and systems for their improvement.
This book offers a unique model for understanding the cognitive underpinnings, interactions and discursive effects of our evolving use of smartphones in everyday app-mediated communication, from text messages and GIFs to images, video and social media apps.
This book offers a unique model for understanding the cognitive underpinnings, interactions and discursive effects of our evolving use of smartphones in everyday app-mediated communication, from text messages and GIFs to images, video and social media apps.
The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications.
The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications.
Cybercrime and Information Technology: Theory and Practice-The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.
Cybercrime and Information Technology: Theory and Practice-The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.
Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts.
Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts.