Showing 1 - 10 of 71
, knowledge management, and the open source model -- Section 2. Blockchain technology. Chapter 9. A novel security framework for … managing android permissions using blockchain technology ; Chapter 10. Evaluation of blockchain in capital market use …
Persistent link: https://www.econbiz.de/10012393278
"This book explores the severity of the threats at personal, business, governmental and societal levels; as well as what can be done to enhance security at these different levels. It covers topics such as: malware, criminal and strategic hacking, botnets, innovative cyber-attacks, cyber...
Persistent link: https://www.econbiz.de/10012393206
"This book explores the development of intelligent techniques for the information security in the area of biomedical image and signal processing. It emphasizes on data security and content protection in modern health care system"--
Persistent link: https://www.econbiz.de/10012393219
"This book examines topics of interest and continuing importance for information technology management in a variety of settings. It also explores how information systems and intelligent knowledge processing are playing an increased role in business, science and technology"--
Persistent link: https://www.econbiz.de/10012393256
management, Blockchain technologies, and related topics"--Provided by publisher. …
Persistent link: https://www.econbiz.de/10012393268
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and...
Persistent link: https://www.econbiz.de/10011726700
"This book compiles research on topics such as technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy, offering methodologies, research frameworks, theory development and validation, case studies, simulations, technological...
Persistent link: https://www.econbiz.de/10011726890
"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011726908
"This book spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology and explores the new threats that cyberspace poses to the privacy of individuals, as well as the threats that surveillance technologies generate in public spaces and in...
Persistent link: https://www.econbiz.de/10011726982
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727034