Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 37th IFIP TC 11... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 15th IFIP WG 11.8 World Conference on Information Security Education, WISE 2022, held in Copenhagen, Denmark, in June 2021. The 8 papers presented were carefully reviewed and selected from 17 submissions.
Bemærk: Kan ikke leveres før jul.
This book presents best selected papers presented at the Second International Conference on Emerging Technologies for Computing, Communication and Smart Cities (ETCCS 2021) held on 21-22 August 2021 at BFCET, Punjab, India.
Bemærk: Kan ikke leveres før jul.
This book is a compilation of selected papers from the Sixth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in October 2021 in Zhuji, Zhejiang, China.
Bemærk: Kan ikke leveres før jul.
This book covers major areas of device and data security and privacy related to the Internet of Things (IoT). The book also contains a unique... Læs mere
Bemærk: Kan ikke leveres før jul.
This book is a collection of best selected research papers presented at 7th International Conference on Computing in Engineering and Technology (ICCET 2022), organized by Dr. Babasaheb Ambedkar Technological University, Lonere, India, during February 12 – 13, 2022.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm.
Bemærk: Kan ikke leveres før jul.
Digital media have become deeply immersed in our lives, heightening both hopes and fears of their affordances. Emotions Online explores the visions that shape responses to media and the emotional regimes that govern people’s engagements with them.
Bemærk: Kan leveres før jul.
This book presents new cyber-physical security findings for Industry 4.0 using emerging technologies... Læs mere
Bemærk: Kan ikke leveres før jul.
An explanation of the five pillars or battlefields of Cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. The five battlefields include Economics, Technology, Information, Education and Leadership.
Bemærk: Kan ikke leveres før jul.
This book teaches you everything that you need to know about preparing your company for a potential data breach. It is meant for the everyday business owner and makes these concepts simple to understand and apply.