for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The goals of this book are to provide a comprehensive review of identity policies as they are being implemented in various countries around the world, to consider... Læs mere
Bemærk: Kan ikke leveres før jul.
Examining the role of communication interception technology (CIT) in the investigation... Læs mere
Bemærk: Kan ikke leveres før jul.
While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic.
Bemærk: Kan ikke leveres før jul.
This highly original book is an ethnographic noir of how Big Data profits from patient private health information. Primarily told through a... Læs mere
Bemærk: Kan ikke leveres før jul.
This book lays out the foundation of a privacy doctrine suitable to the cyber age. It limits the volume, sensitivity, and secondary analysis that can be... Læs mere
Bemærk: Kan ikke leveres før jul.
Despite the pervasiveness of the Internet and its importance to a wide range of state functions, we still have... Læs mere
Bemærk: Kan ikke leveres før jul.
This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems;
Bemærk: Kan ikke leveres før jul.
In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of... Læs mere
Bemærk: Kan ikke leveres før jul.
In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.