Showing 1 - 10 of 435
risk assessment in IT environments: a decision guide -- Chapter 10. Beware!: a multimodal analysis of cautionary tales in …
Persistent link: https://www.econbiz.de/10012393206
"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011726908
1. The UID project / Rajarshi Chakraborthy ... et al. -- 2. Combined impact of outsourcing and hard times on BPO risk …
Persistent link: https://www.econbiz.de/10011727038
"This book investigates the impact of anonymity and its effects on online identity and learning, and reveals issues of authenticity and trust, which are at the heart of online learning"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727101
"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network...
Persistent link: https://www.econbiz.de/10011727149
1. Responsibility, jurisdiction, and the future of "privacy by design" / Ugo Pagallo -- 2. Hacking: legal and ethical aspects of an ambiguous activity / Gráinne Kirwan and Andrew Power -- 3. Emerging cybercrime trends: legal, ethical, and practical issues / Sean M. Zadig and Gurvirender Tejay...
Persistent link: https://www.econbiz.de/10011727193
"Cyber behavior, such as e-learning, e-voting, e-shopping, e-privacy, and e-therapy, could be broadly considered as any physical, social, or mental activities that humans engage in interacting with the Internet and that can be objectively observed in cyber space. The Encyclopedia of Cyber...
Persistent link: https://www.econbiz.de/10011727360
-Kierkegaard -- 51. The U.S. military response to cyber warfare / Richard Kilroy Jr. -- 52. USA's view on world cyber security issues …
Persistent link: https://www.econbiz.de/10011725950
"This book recognizes the importance of information technology by addressing the most crucial issues, challenges, opportunities, and solutions related to the role and responsibility of an information system, highlighting various aspects of the organizational and legal implications of system...
Persistent link: https://www.econbiz.de/10011727840
"This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011728228