Bemærk: Kan ikke leveres før jul.
The cyber threat landscape is changing constantly and corporations are looking to measure their level of risk and deciding how to insure against it. This book helps IT security team members and managers to asses cyber risk levels and insurance needs.
Bemærk: Kan ikke leveres før jul.
This book covers decades of digital eavesdropping and manipulation of agencies to Stuxnet, the world’s first use of digital code... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book constitutes the thoroughly refereed proceedings of the 11th... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, andhighlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues.
Bemærk: Kan ikke leveres før jul.
This book constitutes revised selected papers from the 12th international Global Sourcing Workshop 2018, held in La Thuile, Italy, in February 2018.
Bemærk: Kan leveres før jul.
The two-volume set LNCS 11442 and 11443 constitutes the refereed... Læs mere
Bemærk: Kan ikke leveres før jul.
The two-volume set LNCS 11442 and 11443 constitutes the refereed... Læs mere
Bemærk: Kan ikke leveres før jul.
The book provides copyright protection approaches for videos using watermarking. The various watermarking techniques using various transforms such as discrete cosine transform (DCT), discrete wavelet transform (DWT) and singular value decomposition (SVD) for videos are presented.