Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
"Technologies and Innovations for Sustainable Development" offers a comprehensive exploration of cutting-edge solutions that can help us build a... Læs mere
Bemærk: Kan ikke leveres før jul.
Cyber Terrorism: A Guide for Facility Managers addresses cyberterrorism and other forms of terrorist activity including mailroom security, bomb threats, and... Læs mere
Bemærk: Kan ikke leveres før jul.
Cyber-security and its related threats change constantly. The book aims at using practical contemporary machine learning-based techniques for... Læs mere
Bemærk: Kan ikke leveres før jul.
On the cutting edge of cyber-security and IoT, this state-of-the-art book will discuss different cyber-security domains and will leverage... Læs mere
Bemærk: Kan ikke leveres før jul.
This book is intended to make the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector. It is aimed primarily at graduates, postgraduates and researchers in digital forensics and cybersecurity.
Bemærk: Kan ikke leveres før jul.
David Houston Jones builds a bridge between practices conventionally understood as forensic, such as crime scene investigation, and the broader field of activity which the forensic now designates, for example performance and installation art, as well as photography.
Bemærk: Kan ikke leveres før jul.
This third edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, where, what, when, why and how in the investigation of cybercrime.
Bemærk: Kan ikke leveres før jul.
This book navigates the crisscrossing of intelligent technology and legal field in building up new landscape of transformation. It analyses deep learning... Læs mere
Bemærk: Kan ikke leveres før jul.
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out various malicious activities. This book will be... Læs mere
Bemærk: Kan ikke leveres før jul.
This book takes a new approach by turning the problem of control upside down as it focuses on control of... Læs mere
Bemærk: Kan ikke leveres før jul.
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.