Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Doing Research In and On the Digital aims to deliver on two fronts; first, by detailing how researchers are devising and... Læs mere
Bemærk: Kan ikke leveres før jul.
This book covers the introduction of and state-of-the-art watermarking techniques developed in various domains along with their hardware... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup and recovery, and explores such additional considerations as legal, privacy, and ethical issues
Bemærk: Kan ikke leveres før jul.
Cyber Strategy Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber... Læs mere
Bemærk: Kan ikke leveres før jul.
Bringing together international experts, this book offers an interdisciplinary approach to cybercrime, explores a range of issues from cybersecurity to hacking to fraud, and lays out frameworks for collaboration between different fields.
Bemærk: Kan ikke leveres før jul.
Educational Institutions do not have an approach for improving awareness among students to increase their knowledge and protection from potential... Læs mere
Bemærk: Kan ikke leveres før jul.
This book outlines the findings and conclusions of a multi-disciplinary team of data scientists, lawyers and economists tasked with studying both the... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The book investigates the areas of digital forensics, digital investigation, and data analysis procedures as they apply to computer fraud and cyber crime, with the main objective of describing a variety of digital crimes and retrieving potential digital evidence.
Bemærk: Kan ikke leveres før jul.
This book focuses on security issues in the IoT environment. It analyzes the security problems of each layer separately and try to identity solutions. It also analyzes the integration and scalability issues with the cross-layer architecture of IoT in detail.