Bemærk: Kan ikke leveres før jul.
The new fifth edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. The book includes many examples, applications and advanced research issues, as well as implementation using MATLAB wherever required.
Bemærk: Kan ikke leveres før jul.
Written by two industry experts, this book will allow you to navigate new General Data Protection Regulations from a real-world business perspective. Whether... Læs mere
Bemærk: Kan ikke leveres før jul.
This book discusses various common occupational and organizational fraud schemes, based on the... Læs mere
Bemærk: Kan ikke leveres før jul.
An accessible overview of the machine ethics technology likely to be installed in military and police robots and... Læs mere
Bemærk: Kan ikke leveres før jul.
This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.
Bemærk: Kan ikke leveres før jul.
Doing Research In and On the Digital aims to deliver on two fronts; first, by detailing how researchers are devising and... Læs mere
Bemærk: Kan ikke leveres før jul.
This book covers the introduction of and state-of-the-art watermarking techniques developed in various domains along with their hardware... Læs mere
Bemærk: Kan ikke leveres før jul.
This book outlines the findings and conclusions of a multi-disciplinary team of data scientists, lawyers and economists tasked with studying both the... Læs mere
Bemærk: Kan ikke leveres før jul.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy.
Bemærk: Kan ikke leveres før jul.
This book examines how espionage and its applications have changed since World War II and how domestic, regional, and international legal mechanisms can provide an effective legal solution to this change affecting the economic well-being of individuals, companies, and states.