Bemærk: Kan ikke leveres før jul.
This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contributions related to current defensive approaches of various attacks on OSNs.
Bemærk: Kan ikke leveres før jul.
This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud... Læs mere
Bemærk: Kan ikke leveres før jul.
Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in cloud computing.
Bemærk: Kan ikke leveres før jul.
Proof techniques in cryptography are very difficult to understand even for students or researchers who major in cryptography. In addition,... Læs mere
Bemærk: Kan ikke leveres før jul.
This book is designed for readers who have an interest in the cyber security domain, including students... Læs mere
Bemærk: Kan ikke leveres før jul.
This book offers a unique model for understanding the cognitive underpinnings, interactions and discursive effects of our evolving use of smartphones in everyday app-mediated communication, from text messages and gifs to images, video and social media apps.
Bemærk: Kan ikke leveres før jul.
This book explores the intersection of gender, digitization, and resilience in international development. It will be of... Læs mere
Bemærk: Kan ikke leveres før jul.
The book will review how new and old privacy-preserving techniques can provide practical protection... Læs mere
Bemærk: Kan ikke leveres før jul.
The book will review how new and old privacy-preserving techniques can provide practical protection... Læs mere
Bemærk: Kan ikke leveres før jul.
The main objective of this book is to introduce cyber security using modern technologies like AI,... Læs mere
Bemærk: Kan ikke leveres før jul.
This book summarizes the progress in the research and provides step by step guide towards every aspect of cloud and other connected technologies. The book also covers the security aspects in the field of Cloud computing, Fog/Edge computing, IoT, etc.
Bemærk: Kan ikke leveres før jul.
This book focuses on how new technologies are raising and reshaping ethical questions and practices which aim to automate ethics into program outputs.