"This book provides the resources necessary for cryptographers, cryptanalysts, developers, and information technology managers to adopt and implement techniques for solving complex problems in cryptog
There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the im
"This book contains chapters in the areas of HCI Challenges for Big Data Security and Privacy. It includes research and development results of lasting significance in the theory, design, implementatio
Discusses how engineers are finding ways to improve cybersecurity around the world, including strengthening personal identification systems, developing biometric scanners, and improving network securi
In 1953, a man was found dead from cyanide poisoning near the Philadelphia airport with a picture of a Nazi aircraft in his wallet. Taped to his abdomen was an enciphered message. In 1912, a book deal
This book takes a much needed look at cybersecurity from a challenging, geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considera
This book takes a much needed look at cybersecurity from a challenging, geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considera
"This book covers the fundamental concepts of big data management and analytics along with recent research development in big data. It also includes various real time/offline applications and case stu
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of
This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.Like it or not, your every move is being
Asharaf and Adarsh present readers with a comprehensive guide to emerging academic research into block chain innovation and their application in contractural agreements of various types. The author