Showing 71 - 80 of 15,552
Persistent link: https://www.econbiz.de/10014245822
The growing number of connected Internet of Things (IoT) devices has led to the daily growth of network botnet attacks. The networks of compromised devices controlled by a single entity can be used for malicious purposes such as denial of service distributed IoT botnet attacks and theft of...
Persistent link: https://www.econbiz.de/10014520396
Persistent link: https://www.econbiz.de/10014581677
Persistent link: https://www.econbiz.de/10012213298
Persistent link: https://www.econbiz.de/10015057327
Cybersecurity planning within a complex system and applying its principles aims to achieve system resilience in cyberspace. The purpose of a complex system is to carry out a mission as a set of abilities and preferences concerning the internal and external circumstances of the system. Achieving...
Persistent link: https://www.econbiz.de/10014496195
Persistent link: https://www.econbiz.de/10014284607
Persistent link: https://www.econbiz.de/10014438879
Chapter 1. Data Sovereignty -- Chapter 2. Digital Governance -- Chapter 3. Conflicts of Law -- Chapter 4. Technical Complexities -- Chapter 5. Comparative Legal Strategies -- Chapter 6. Emerging Topics in Data Sovereignty and Digital Governance.
Persistent link: https://www.econbiz.de/10013406959
Persistent link: https://www.econbiz.de/10014529558