"This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure
"This book presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system secu
"This book explores current research on how to implement smart sensor networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, lightweight crypto and secur
"This book evolves technological relationships of humans with a focus on ethical implications for human life, social norms and values, education, work, and ecological impacts. It provides cutting- edg
"This book explores the development of intelligent techniques for the information security in the area of biomedical image and signal processing. It emphasizes on data security and content protection
"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethi
"This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasu
"This book focuses on the IT field from the outlook of industry professionals and covers multidisciplinary themes such as human resource management, sociology, psychology, and management along with te
"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack
"This book presents the concept of cloud computing and explore the various shortcomings of cloud. It highlights the background of assorted issues that arises in the field of cloud computing especially
"This book explores moral implications of weapons design and development. It covers topics such as defense, projectile weapons, nuclear weapons, the real costs of war, weapon design in peacetime, and
"This book provides the resources necessary for cryptographers, cryptanalysts, developers, and information technology managers to adopt and implement techniques for solving complex problems in cryptog
"This book discusses the advances of Detecting and Mitigating Robotic Cyber Security Risks. Moreover, it aims to address how new innovation will cater to the demands of human beings and how it will he
"This book covers the fundamental concepts of big data management and analytics along with recent research development in big data. It also includes various real time/offline applications and case stu
"This book aims at analyzing impact of such changes in developing countries on the information and data generated, owned and maintained by the government. The book focus on the challenges, weaknesses
Computer scientists specializing in network security discuss security issues regarding the Internet of Things for students, researchers, and practitioners. Their topics include the Internet of Thin
Asharaf and Adarsh present readers with a comprehensive guide to emerging academic research into block chain innovation and their application in contractural agreements of various types. The author
Computer scientists and communications engineers review the current methodologies and mechanisms in the theory and practice of security, privacy, intrusion detection, and applied cryptography in sm
Technology, political science, and other researchers from Europe, South Africa, Argentina, and the US provide 11 chapters that explore threat mitigation and detection of cyberwarfare and cyberterro
"This book provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures, offering a broad perspective, from network sec
Computer scientists review recent research papers on online banking security techniques, approaches, technologies, and case studies. The information could help policy makers, technology developers,
"This book examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organizations, highlighting socio-ethical issues, policy
Munir presents a collection of academic and professional perspectives on current and emerging trends in the security management of mobile cloud computing devices and networks. The eight selections tha
Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunt
Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with th