Account
Orders
Advanced search
Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books...
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...
This book introduces fundamental concepts of cyber resilience, drawing expertise from academia, industry, and government. Resilience is defined as the ability to recover from or easily adjust to shocks and stresses. Unlike the concept of security - which is...
This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach. It also tackles the CBRNE-Cyber threats, their risk mitigation measures and the...
This book reports on the latest research and developments in the field of cybersecurity, placing special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...
This book covers many aspects of cyberspace, emphasizing not only its possible ‘negative’ challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production....
The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a...
This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as...
This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the...
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of...
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the...
This book covers three major parts of Big Data: concepts, theories and applications. Written by world-renowned leaders in Big Data, this book explores the problems, possible solutions and directions for Big Data in research and practice. It also focuses on...
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are...
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.The book gives a profound idea of the most spoken phenomenon of this time....
By using various data inputs, ubiquitous computing systems detect their current usage context, automatically adapt their services to the user’s situational needs and interact with other services or resources in their environment on an ad-hoc basis.Designing such...
?What will business software look like in the future? And how will it be developed?This book covers the proceedings of the first international conference on Future Business Software – a new think tank discussing the trends in enterprise software with speakers from...
This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of...
This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its...
As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the...
One of the fundamental questions of Banach space theory is whether every Banach space has a basis. A space with a basis gives us the feeling of familiarity and concreteness, and perhaps a chance to attempt the classification of all Banach spaces and other problems. The...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers