You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.
Communication, Management and Information Technology contains the contributions presented at the International Conference on Communication, Management and Information Technology (ICCMIT 2016, Cosenza, Italy, 26-29 April 2016, organized by the Universal Society of Applied Research (USAR). The book aims at researchers, scientists, engineers, and scholar students interested or involved in Computer Science and Systems, Communication, and Management.
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research ...
This book provides an insightful examination of cybersecurity threats and their implications across various sectors, including healthcare, agriculture, and government. It covers fundamental concepts in cybersecurity, including cybercrime laws, cyberbullying and emerging technologies. It discusses challenges in detecting and preventing cyber threats and analyzes trends in cyber warfare and resilience. This book serves as a resource for understanding the complex relationship between technology and society, equipping readers with the knowledge needed to navigate the evolving cyber landscape. It is for scholars, students, and professionals interested in cybersecurity and challenges. This book in...
This book constitutes the refereed proceedings of the 45th Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2016, held in Cullinan, South Africa, in July 2016. The three revised full papers and 13 work-in-progress papers presented together with two invited keynote papers were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on assessment methods, instruction methods, new curricula, social skills, and various experiences.
"This book provides the latest empirical research and theoretical frameworks in the area of information security, presenting research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems"--Provided by publisher.
This book constitutes the thoroughly refereed proceedings of the 6th International Conference on Ad Hoc Networks, ADHOCNETS 2014, held in Rhodes, Greece, in August 2014. The 16 regular and invited papers presented were carefully selected and reviewed from numerous submissions and cover a wide range of applications, such as mobile ad hoc networks, sensor networks, vehicular networks, intelligent transportation systems, wireless sensor networks security.
None