While advances in information technology and the adoption of Internet as service delivery channels have enabled financial service institutions to provide more convenient assistance, they have diversified and complicated the nature of risks involved.Managing Information Assurance in Financial Services provides high-quality research papers and industrial practice articles in the areas of information security in the financial service industry. Managing Information Assurance in Financial Services provides insight into current information security measures, including: technology, processes, and...
While advances in information technology and the adoption of Internet as service delivery channels have enabled financial service institutions to prov...
It is becoming increasingly evident that the weakest links in the information-security chain are the people. Due to an increase in information security threats, it is imperative for organizations and professionals to learn more on the human nature and social interactions behind those creating the problem. Social and Human Elements of Information Security: Emerging Trends and Countermeasures provides insightful, high-quality research into the social and human aspects of information security. A comprehensive source of the latest trends, issues, and findings in the field, this book fills the...
It is becoming increasingly evident that the weakest links in the information-security chain are the people. Due to an increase in information securit...
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape. Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the...
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering co...
This book proposed a modified artificial bee colony algorithm for job scheduling problem. Results of the proposed algorithm shows that the efficiency of proposed algorithm is better then the original Genetic Algorithm. This algorithm produced better results for those problems that do not generate exact solution.Finally, Overall motive of these type of algorithms are to get more optimized results from the previous one. Silent Features are: More efficient algorithm, Less time complexity, Easily to understand the proposed concept, Simple language, Helpful for generating new ideas.
This book proposed a modified artificial bee colony algorithm for job scheduling problem. Results of the proposed algorithm shows that the efficiency ...
This book proposed two approaches for secure ad-hoc on demand distance vector routing (AODV) against black hole attack in mobile ad-hoc network. The black hole attack one of such security risks in mobile ad-hoc network (MANET). In this attack, a malicious node falsely advertise shortest path to the destination node with an intention to disrupt the communication. We propose a simple, efficient and effective method for making a secure routing protoccol with minimum routing overhead to combat the black hole problem. The proposed method does not require any database, extra memory and more...
This book proposed two approaches for secure ad-hoc on demand distance vector routing (AODV) against black hole attack in mobile ad-hoc network. The b...
"This book brings together new ideas on how to deal with potential leaks of valuable customer information, highlighting the legal aspects of identity protection, trust and security, and detection techniques"--
"This book brings together new ideas on how to deal with potential leaks of valuable customer information, highlighting the legal aspects of identity ...
Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow exponentially. Threats, Countermeasures, and Advances in Applied Information Security addresses the fact that managing information security program while effectively managing risks has never been so critical. This book contains 24 chapters on the most relevant and important issues and advances in applied information security management. The chapters are authored by leading researchers and practitioners in the field of information security from...
Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow expo...
Information retrieval with verbose natural language queries has been generating a lot of interest in recent years. The focus of many novel search applications has shifted from short keyword queries to verbose queries. Examples include question answering systems and dialogue systems, voice search on mobile devices, and entity search engines like Facebook's Graph Search or Google's Knowledge Graph. However, the performance of textbook information retrieval techniques for such verbose queries is not as good as that for their shorter counterparts. Thus, effective handling of verbose queries has...
Information retrieval with verbose natural language queries has been generating a lot of interest in recent years. The focus of many novel search appl...