Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book analyzes the security of critical infrastructures such as road, rail, water, health, and electricity networks that are vital for a nation’s society and economy, and assesses the resilience of these networks to intentional attacks.
Bemærk: Kan ikke leveres før jul.
This book contains selected papers presented at the 14th IFIP WG 9.2,... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan leveres før jul.
It profiles salient technologies and science, including persuasion science, artificial intelligence and machine learning (AI/ML), surveillance technologies, complex adaptive systems, network science, directed human modification, and biosecurity.
Bemærk: Kan ikke leveres før jul.
This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense.
Bemærk: Kan ikke leveres før jul.
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book primarily focuses on providing deep insight into the concepts of network security, network forensics, botnet forensics, ethics and incident response in... Læs mere
Bemærk: Kan ikke leveres før jul.
This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities... Læs mere
Bemærk: Kan ikke leveres før jul.
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust.
Bemærk: Kan ikke leveres før jul.
This book explores the strategic decisions made by organizations when implementing cybersecurity controls, leveraging economic models and theories from the economics of information security and risk management frameworks.