Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.Attribution is the process of tracking and identifying the actors behind these cyber-attacks.
Bemærk: Kan ikke leveres før jul.
This book presents selected papers from the 10th International Conference on Information Science and Applications (ICISA 2019), held on December 16–18,... Læs mere
Bemærk: Kan ikke leveres før jul.
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This volume covers several important topics such as optimal data selection and error-free data acquiring via artificial... Læs mere
Bemærk: Kan ikke leveres før jul.
This book presents the select proceedings of the International Conference on Automation, Signal... Læs mere
Bemærk: Kan ikke leveres før jul.
It first introduces architecture approaches for IoT and IoT security, describing the security techniques for different layers in the IoT... Læs mere
Bemærk: Kan ikke leveres før jul.
This book presents new and innovative current discoveries in social networking which contribute enough knowledge to the research community.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Bemærk: Kan leveres før jul.
This textbook is designed to teach students and practitioners how to integrate Six Sigma techniques with cybersecurity applications, specifically in training current and future cybersecurity professionals.