This book covers the full life cycle of conducting a mobile and computer digital forensic examination, including planning and performing an investigation as well as report writing and testifying.
This book covers the full life cycle of conducting a mobile and computer digital forensic examination, including planning and performing an investigation as well as report writing and testifying.
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy.
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods.
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods.
Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security.
Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security.
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs).
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs).
In the modern world, most gross product is created within Enterprise firms, project programs, state agencies, transnational corporations and their divisions, as well as various associations and compositions of the above entities.
In the modern world, most gross product is created within Enterprise firms, project programs, state agencies, transnational corporations and their divisions, as well as various associations and compositions of the above entities.
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy.
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy.
Advances in smart healthcare systems (SHS) and artificial intelligence (AI) domains highlight the need for ICT systems that aim not only to improve human quality of life but improve safety too.
Advances in smart healthcare systems (SHS) and artificial intelligence (AI) domains highlight the need for ICT systems that aim not only to improve human quality of life but improve safety too.
Despite increasing scholarly attention to artificial intelligence (AI), studies at the intersection of AI and communication remain ripe for exploration, including investigations of the social, political, cultural, and ethical aspects of machine intelligence, interactions among agents, and social artifacts.
Despite increasing scholarly attention to artificial intelligence (AI), studies at the intersection of AI and communication remain ripe for exploration, including investigations of the social, political, cultural, and ethical aspects of machine intelligence, interactions among agents, and social artifacts.
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network.
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network.
The quantity, diversity, and sophistication of Internet of Things (IoT) items are rapidly increasing, posing significant issues but also innovative solutions for forensic science.
Becoming a Digital Parent is a practical, readable guide that will help all parents have confidence to successfully navigate technology with their children.
Becoming a Digital Parent is a practical, readable guide that will help all parents have confidence to successfully navigate technology with their children.
This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc.
This book seeks to provide and promote a better understanding and a more responsive and inclusive governance of the automation and digital devices in public institutions, particularly the law and justice sector.
This book seeks to provide and promote a better understanding and a more responsive and inclusive governance of the automation and digital devices in public institutions, particularly the law and justice sector.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes.
This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc.