Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization.
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork.
Written on the occasion of copyright's 300th anniversary, John Tehranian's Infringement Nation presents an engaging and accessible analysis of the history and evolution of copyright law and its profound impact on the lives of ordinary individuals in the twenty-first century.
In this much anticipated sequel to the legal bestseller, The Future of Law, Susskind lays down a challenge to all lawyers to ask themselves, with their hands on their hearts, what elements of their current workload could be undertaken differently - more quickly, cheaply, efficiently, or to a higher quality - using alternative methods of working.
Highly publicized legal cases, such as those involving libel verdicts, obscenity prosecutions, the First Amendment, and other areas of media law have focused attention on only one part of the media's impact on law.
This sweeping introduction to the science of virtual environment technology masterfully integrates research and practical applications culled from a range of disciplines, including psychology, engineering, and computer science.
Many people need help planning for retirement, saving, investing, and decumulating their assets, yet financial advice is often complex, potentially conflicted, and expensive.
Many people need help planning for retirement, saving, investing, and decumulating their assets, yet financial advice is often complex, potentially conflicted, and expensive.
This book provides an incisive analysis of the emergence and evolution of global Internet governance, revealing its mechanisms, key actors and dominant community practices.
In this much anticipated sequel to the legal bestseller, The Future of Law, Susskind lays down a challenge to all lawyers to ask themselves, with their hands on their hearts, what elements of their current workload could be undertaken differently - more quickly, cheaply, efficiently, or to a higher quality - using alternative methods of working.
Currently, computational intelligence approaches are utilised in various science and engineering applications to analyse information, make decisions, and achieve optimisation goals.
This book focuses on the recent rise of "e;infodemics"e; as forms of disinformation, misinformation and mal-information saturate contemporary media platforms, shaping public opinion to advance agendas.
This book focuses on the recent rise of "e;infodemics"e; as forms of disinformation, misinformation and mal-information saturate contemporary media platforms, shaping public opinion to advance agendas.
This book results from many years of teaching an upper division course on communication networks in the EECS department at the University of California, Berkeley.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
Revolutionizing Communication: The Role of Artificial Intelligence explores the wide-ranging effects of artificial intelligence (AI) on how we connect and communicate, changing social interactions, relationships, and the very structure of our society.
This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security.
Cybersecurity is set to be one of the dominant themes in EU governance in the coming years, and EU law has begun to adapt to the challenges presented by security with the adoption of the Network and Information Security (NIS) Directive.
In an era where digital devices increasingly mediate our perception of reality, this book explores the tension between the richness of direct sensory experience and the allure of the screen.
Sams Teach Yourself LinkedIn(R) in 10 Minutes, Second Edition Sams Teach Yourself Linkedln(R) in 10 Minutes, Second Edition offers straightforward, practical answers when you need fast results.
This book presents a model-driven approach for creating a national application profile of the international legislative document standard Akoma Ntoso (AKN).
Dieses Praktikerhandbuch enthält Hinweise zur praktischen Umsetzung der EU-Datenschutz-Grundverordnung (DSGVO) sowie eine systematische Analyse der neuen Vorschriften.
Professionelle Hackerangriffe (sogenannte Advanced Persistent Threats) treffen heutzutage Regierungen, Unternehmen und sogar kritische Infrastrukturen wie Flughäfen oder Stromnetzbetreiber.