Télécharger le livre :  Fog/Edge Computing For Security, Privacy, and Applications

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications.This book is organized into five parts with a total of 15 chapters. Each area corresponds to an...
Editeur : Springer
Parution : 2021-01-04
Collection : Advances in Information Security
Format(s) : PDF, ePub
116,04
Guide des formats
Télécharger le livre :  New Dimensions of Information Warfare

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world...
Editeur : Springer
Parution : 2020-12-03
Collection : Advances in Information Security
Format(s) : PDF, ePub
126,59
Guide des formats
Télécharger le livre :  Advance Metadata Fair

This book outlines the legal powers of a major Western nation – Australia – to collect and use location information. Mobile service and social media service providers now have the ability to track, record and store more precise location information. Unlike 4G, 5G mobile...
Editeur : Springer
Parution : 2020-08-30
Collection : Law, Governance and Technology Series
Format(s) : PDF, ePub
116,04
Guide des formats
Télécharger le livre :  Security Rights in Intellectual Property

This book discusses the main legal and economic challenges to the creation and enforcement of security rights in intellectual property and explores possible avenues of reform, such as more specific rules for security in IP rights and better coordination between...
Editeur : Springer
Parution : 2020-06-11
Collection : Ius Comparatum - Global Studies in Comparative Law
Format(s) : PDF, ePub
147,69
Guide des formats
Télécharger le livre :  We Have Root

A collection of popular essays from security guru Bruce Schneier  In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role...
Editeur : Wiley
Parution : 2019-08-08

Format(s) : PDF, ePub
18,04
Guide des formats
Télécharger le livre :  Cyber Smart

An easy-to-read guide to protecting your digital life and your family online The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who...
Editeur : Wiley
Parution : 2018-12-06

Format(s) : PDF, ePub
18,04
Guide des formats
Télécharger le livre :  Facebook, Twitter, & Instagram For Seniors For Dummies

Enjoy the top social media sites with ease and security  Done correctly, social media is a way to connect friends, family, and the world while still maintaining security and privacy. Facebook, Twitter, & Instagram For Seniors For Dummies, 3rd Edition offers advice on...
Editeur : For Dummies
Parution : 2018-11-26

Format(s) : PDF, ePub
24,05
Guide des formats
Télécharger le livre :  Designing for Privacy and its Legal Framework

This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also introduces the need for a...
Editeur : Springer
Parution : 2018-11-03
Collection : Law, Governance and Technology Series
Format(s) : PDF, ePub
126,59
Guide des formats
Télécharger le livre :  Handbook of Mobile Data Privacy

This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in...
Editeur : Springer
Parution : 2018-10-26

Format(s) : PDF, ePub
116,04
Guide des formats
Télécharger le livre :  Social Engineering

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software,...
Editeur : Wiley
Parution : 2018-06-25

Format(s) : PDF, ePub
31,65
Guide des formats
page 1 sur 3 >