This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions.
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security.
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security.
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.
This book primarily focuses on providing deep insight into the concepts of network security, network forensics, botnet forensics, ethics and incident response in global perspectives.
This book primarily focuses on providing deep insight into the concepts of network security, network forensics, botnet forensics, ethics and incident response in global perspectives.
Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company.
Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company.
Many governments around the world are calling for the use of biometric systems to provide crucial societal functions, consequently making it an urgent area for action.
Many governments around the world are calling for the use of biometric systems to provide crucial societal functions, consequently making it an urgent area for action.
This book explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape due to the extraordinary circumstances triggered by the COVID-19 pandemic.
This book explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape due to the extraordinary circumstances triggered by the COVID-19 pandemic.
Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data provides a detailed insight on how to reap the benefits of blockchain technology in healthcare, as the healthcare sector faces several challenges associated with privacy and security issues.
Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data provides a detailed insight on how to reap the benefits of blockchain technology in healthcare, as the healthcare sector faces several challenges associated with privacy and security issues.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role.
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.
The quantity, diversity, and sophistication of Internet of Things (IoT) items are rapidly increasing, posing significant issues but also innovative solutions for forensic science.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life.
Handbook of Usability and User Experience: Methods and Techniques is concerned with emerging usability and user experience in design concepts, theories and applications of human factors knowledge focusing on the discovery, design and understanding of human interaction and usability issues with products and systems for their improvement.
Handbook of Usability and User Experience: Methods and Techniques is concerned with emerging usability and user experience in design concepts, theories and applications of human factors knowledge focusing on the discovery, design and understanding of human interaction and usability issues with products and systems for their improvement.
This volume of the Handbook of Usability and User Experience (UX) presents research and case studies used to design products, systems and environments with good usability and consequent acceptance, pleasure in use, good user experience, and understanding of human interaction issues with products and systems for their improvement.
This volume of the Handbook of Usability and User Experience (UX) presents research and case studies used to design products, systems and environments with good usability and consequent acceptance, pleasure in use, good user experience, and understanding of human interaction issues with products and systems for their improvement.