Описание: Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.
Digital Transformation for an Inclusive Society - DTIS.- Everybody Rock Your Equity: Experiences of Organizing a Women in Computing Event with Role Models for Diversity and Inclusion.- Alenta: a practitioner's case of technology usage to support special needs of populations with cognitive disabilities.- Evaluating digitalization of social services from the viewpoint of the Citizen.- eHealth Approach for Motivating Physical Activities of People with Intellectual Disabilities.- Trust and Privacy Aspects of Smart Information Environments - TPSIE.- Towards a Right Not to Be Deceived? An Interdisciplinary Analysis on Personalization in the light of the GDPR.- Software Assisted Privacy Impact Assessment in Interactive Ubiquitous Computing Systems.- Facilitating GDPR compliance: the H2020 BPR4GDPR approach.- Designing a Privacy Dashboard for a Smart Manufacturing Environment.- RRTxFM: Probabilistic Counting for Differentially Private Statistics.- Innovative Teaching of Introductory Topics in Information Technology - 3(IT).- Empowering female students to seek careers in game development and creative IT studies.- ATMF: A student-centered framework for the effective implementation of alternative teaching methods for CSEd.- Framework for pupil-to-student transition, learning environment and semester start for first-year students.- CROwd-Powered e-Services - CROPS.- Crowd-based Assessment of Deformational Cranial Asymmetries.- CuneiForce: Involving the crowd in the annotation of unread Mesopotamian cuneiform tablets through a gamified design.- Exploring Self-organisation in Crowd Teams.
Автор: Ryabko, Boris Fionov, Andrey Название: Cryptography in the information society ISBN: 9811226156 ISBN-13(EAN): 9789811226151 Издательство: Marston Book Services Рейтинг: Цена: 15840.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.
Автор: Dimitris Gritzalis; Javier Lopez Название: Emerging Challenges for Security, Privacy and Trust ISBN: 3642101763 ISBN-13(EAN): 9783642101762 Издательство: Springer Рейтинг: Цена: 20956.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the refereed proceedings of the 24th IFIP TC 11 International Information Security Conference, SEC 2009, held in Pafos, Cyprus, in May 2009. In this title, the papers are organized in topical sections on identification and authentication, threats and attacks, applications of cryptography and information hiding, and trusted computing.
Автор: Dhillon Gurpreet S., Dhillon Gurpreet Название: Information Security Management: Global Challenges in the New Millennium ISBN: 1878289780 ISBN-13(EAN): 9781878289780 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 8772.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Presents contributions by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.
Автор: Kumar Gautam, Saini Dinesh Kumar, Cuong Nguyen Ha Huy Название: Cyber Defense Mechanisms: Security, Privacy, and Challenges ISBN: 0367540967 ISBN-13(EAN): 9780367540968 Издательство: Taylor&Francis Рейтинг: Цена: 7042.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.
The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use.
Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.
Автор: Ciampa Mark D. Название: Security Awareness ISBN: 1305500377 ISBN-13(EAN): 9781305500372 Издательство: Cengage Learning Рейтинг: Цена: 9978.00 р. Наличие на складе: Нет в наличии.
Описание: Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, this title continues to present the same straightforward, practical information that has made previous editions so popular.
Автор: Alka Agrawal, Brijesh K. Chaurasia, Neeraj Kumar, Raees Ahmad Khan Название: Limitations and Future Applications of Quantum Cryptography ISBN: 1799866785 ISBN-13(EAN): 9781799866787 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 27166.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.
Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.
A rich examination of the technologies supporting secure digital information transfers from a respected leader in the field
As technology continues to advance, Cryptography, Information Theory, and Error-Correction: A Handbook for the Twenty-First Century is an indispensable resource for anyone interested in the secure exchange of financial information. Identity theft, cybercrime, and other security issues have taken center stage as information becomes easier to access. Three disciplines offer solutions to these digital challenges: cryptography, information theory, and error-correction, all of which are addressed in this book.
This book is geared toward a broad audience of professionals working at financial institutions, law firms, and governments who need updated information to make critical decisions. The book s discussions will also be of interest to those involved in blockchains as well as those working in companies developing and applying security for new products, like self-driving cars. The second edition is also an authoritative overview for IT professionals, statisticians, mathematicians, computer scientists, electrical engineers, and entrepreneurs.
It is an excellent reference for both graduate and undergraduate students of mathematics, computer science, cybersecurity, and engineering. Six new chapters cover current topics like Internet of Things security, new identities in information theory, blockchains, cryptocurrency, compression, and cloud computing and storage. Increased security and applicable research in elliptic curve cryptography are also featured. The book also:
Shares vital, new research in the field of information theory
Provides quantum cryptography updates
Includes over 350 worked examples and problems for greater understanding of ideas.
Cryptography, Information Theory, and Error-Correction guides readers in their understanding of reliable tools that can be used to store or transmit digital information safely.
Описание: This book is intended for periodontal residents and practicing periodontists who wish to incorporate the principles of moderate sedation into daily practice. Comprehensive airway management and rescue skills are then documented in detail so that the patient may be properly managed in the event that the sedation progresses beyond the intended level.
Описание: 2.1 E-Government: e-Governance and e-Democracy The term Electronic Government (e-Government), as an expression, was coined after the example of Electronic Commerce.
Автор: Ciampa, Mark Название: Comptia security + guide to network security fundamentals ISBN: 0357424379 ISBN-13(EAN): 9780357424377 Издательство: Cengage Learning Рейтинг: Цена: 16471.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Seventh Edition, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-601 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the seventh edition includes expanded coverage of security evaluations, embedded device and Internet of Things (IoT) security, and cloud and virtualization security.
Practical, Hands-On Projects, case activities and online virtual labs help you put what you learn into real-world practice, while the innovative Information Security Community Site connects you to up-to-the-minute news and insights from the information security field.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru