Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 2, Management Association Information Reso


Варианты приобретения
Цена: 47401.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до:
Ориентировочная дата поставки:
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Management Association Information Reso
Название:  Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 2
ISBN: 9781668431146
Издательство: Mare Nostrum (Eurospan)
Классификация:



ISBN-10: 1668431149
Обложка/Формат: Hardcover
Страницы: 652
Вес: 1.78 кг.
Дата издания: 04.01.2019
Язык: English
Размер: 27.94 x 21.59 x 3.51 cm
Читательская аудитория: General (us: trade)
Подзаголовок: Concepts, methodologies, tools, and applications, vol 2
Рейтинг:
Поставляется из: Англии


Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 1

Автор: Management Association Information Reso
Название: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 1
ISBN: 1668431130 ISBN-13(EAN): 9781668431139
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 47401.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 3

Автор: Management Association Information Reso
Название: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 3
ISBN: 1668431157 ISBN-13(EAN): 9781668431153
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 47401.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, VOL 1

Автор: Management Association Information Reso
Название: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, VOL 1
ISBN: 1668429985 ISBN-13(EAN): 9781668429983
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 47401.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics

Автор: Mehdi Khosrow-Pour
Название: Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics
ISBN: 1522574921 ISBN-13(EAN): 9781522574927
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 41580.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches.Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.

Trusted Computing: Principles and Applications

Автор: Dengguo Feng
Название: Trusted Computing: Principles and Applications
ISBN: 3110476045 ISBN-13(EAN): 9783110476040
Издательство: Walter de Gruyter
Рейтинг:
Цена: 18586.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Data and Applications Security and Privacy XXXIV: 34th Annual Ifip Wg 11.3 Conference, Dbsec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings

Автор: Singhal Anoop, Vaidya Jaideep
Название: Data and Applications Security and Privacy XXXIV: 34th Annual Ifip Wg 11.3 Conference, Dbsec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings
ISBN: 3030496686 ISBN-13(EAN): 9783030496685
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.*The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions.

Fog/Edge Computing For Security, Privacy, and Applications

Автор: Chang Wei, Wu Jie
Название: Fog/Edge Computing For Security, Privacy, and Applications
ISBN: 3030573303 ISBN-13(EAN): 9783030573300
Издательство: Springer
Рейтинг:
Цена: 20962.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Part I: Overview of Fog/Edge Computing

1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues"

Khaldoon Alshouiliy (University of Cincinnati, USA)

Dharma Agrawal (University of Cincinnati, USA)

2. "An overview of the Edge Computing in Modern Digital Age"

Reinaldo Padilha Franзa (University of Campinas- UNICAMP, Brazil)

Ana Carolina Borges Monteiro (University of Campinas- UNICAMP, Brazil)

Rangel Arthur (University of Campinas- UNICAMP, Brazil)

Yuzo Lano (University of Campinas- UNICAMP, Brazil)

Part II: Security in Fog/Edge Computing

3. "Secure Search and Storage Services in Fog/Edge Computing"

Qin Liu (Hunan University, China)

4. "Collaborative Intrusion Detection Schemes in Fog-to-Things Computing"

Abebe Diro (La Trobe University, Australia)

Abdun Mahmood (La Trobe University, Australia)

Naveen Chilamkurti (La Trobe University, Australia)

5. "On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management"

Ali Shoker (VORTEX Colab, Portugal)

Hussam Yactine (INESC TEC and Universidade do Minho, Portugal)

Part III: Privacy in Fog/Edge Computing

6. "Privacy Issues in Edge Computing"

Qi Xia (College of William and Mary, USA)

Zeyi Tao (College of William and Mary, USA)

Qun Li (College of William and Mary, USA)

7. "Privacy-preserving Edge Video Analytics"

Miao Hu (Sun Yat-sen University, China)

Yao Fu (Sun Yat-sen University, China)

Di Wu (Sun Yat-sen University, China)

Part IV: Architectural Design in Fog/Edge Computing

8. "Vulnerabilities in Fog/Edge Computing from Architectural Perspectives"

Nhu-Ngoc Dao (Sejong University, South Korea)

Ngoc-Thanh Dinh (Soongsil University, South Korea)

Quoc-Viet Pham (Pusan National University, South Korea)

Trung V. Phan (Technische Universitдt Chemnitz, Germany)

Sungrae Cho (Chung-Ang University, South Korea)

Torsten Braun (University of Bern, Switzerland)

9. "Security and Intelligent Management for Fog/Edge Computing Resources"

Jun Wu (Shanghai Jiao Tong University, China)

10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing"

Zichuan Xu (Dalian University of Technology, China)

Weifa Liang (The Australian National University, Australia)

11. "Blockchain-based Security Services for Fog Computing"

Arvind Kiwelekar (Dr. Babasaheb Ambedkar Technological University, India)

Pramod Patil (Dr. Babasaheb Ambedkar Technological University, India

Laxman D. Netak (Dr. Babasaheb Ambedkar Technological University, India)

Sanjay U Waikar (Dr. Babasaheb Ambedkar Technological University, India)

Part V: Applications of Fog/Edge Computing

12. "Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions"

G. S. S. Chalapathi (BITS Pilani, Pilani Campus, India, and The University of Melbourne, Australia)

Vinay Chamola (BITS Pilani, Pilani Campus,

Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, VOL 2

Автор: Management Association Information Reso
Название: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, VOL 2
ISBN: 1668429993 ISBN-13(EAN): 9781668429990
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 47401.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies

Автор: Zubairi Junaid Ahmed, Mahboob Athar
Название: Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
ISBN: 1609608518 ISBN-13(EAN): 9781609608514
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 24453.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Detailing the latest and most important advances in security standards, this introduces the differences between information security and network security. In addition, the book serves as an essential reference to students, researchers, practitioners and consultants in the area of social media, cyber security and information and communication technologies (ICT).

Container Security: Fundamental Technology Concepts That Protect Containerized Applications

Автор: Rice Liz
Название: Container Security: Fundamental Technology Concepts That Protect Containerized Applications
ISBN: 1492056707 ISBN-13(EAN): 9781492056706
Издательство: Wiley
Рейтинг:
Цена: 7126.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions.

Advances in Cyber Security: Principles, Techniques, and Applications

Автор: Kuan-Ching Li; Xiaofeng Chen; Willy Susilo
Название: Advances in Cyber Security: Principles, Techniques, and Applications
ISBN: 9811314829 ISBN-13(EAN): 9789811314827
Издательство: Springer
Рейтинг:
Цена: 22359.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes.Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.

Security and Privacy of Electronic Healthcare Records: Concepts, Paradigms and Solutions

Автор: Tanwar Sudeep, Tyagi Sudhanshu, Kumar Neeraj
Название: Security and Privacy of Electronic Healthcare Records: Concepts, Paradigms and Solutions
ISBN: 1785618989 ISBN-13(EAN): 9781785618987
Издательство: Неизвестно
Рейтинг:
Цена: 26553.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Gathering international contributions, this book is the first 'how-to' guide addressing privacy and security for Electronics Health Records (EHRs): Who can access EHR information? How can users and healthcare staff view EHR information and make sure it is correct? How is the information protected from loss, theft and hacking? What should users and healthcare staff do if they think the information has been compromised? The team of authors present a detailed framework for security and privacy in EHRs, as well as comparative case studies for privacy preservation, scalability, and healthcare legislation.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия