Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The reuse of EMR data can greatly benefit medical science and practice, but must be performed in a privacy-preserving way according to data sharing policies and regulations.
Bemærk: Kan ikke leveres før jul.
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec.
Bemærk: Kan ikke leveres før jul.
This book is an introduction to both offensive and defensive techniques of cyberdeception. Special attention is devoted to cyberdeception in industrial control systems and within operating systems.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP... Læs mere
Bemærk: Kan ikke leveres før jul.
This book presents recent applications and approaches as well as challenges in digital forensic science.
Bemærk: Kan ikke leveres før jul.
This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS).
Bemærk: Kan ikke leveres før jul.
This book provides a thorough treatment of privacy and security issues for researchers in the fields of smart grids, engineering, and computer science.
Bemærk: Kan ikke leveres før jul.
This book provides a practical and strategic perspective on IT and cyber security for corporations and other businesses.... Læs mere
Bemærk: Kan ikke leveres før jul.
This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It... Læs mere
Bemærk: Kan ikke leveres før jul.
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management;
Bemærk: Kan ikke leveres før jul.
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle.