Blockchain Security in Cloud Computing
ISBN: 9783030705039 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly increase data privacy and security while boosting accuracy and integrity in cloud data. The specific highlight of this book is focused on the application of integrated technologies in enhancing cloud security models, use cases, and its challenges. The contributors, both from academia and industry, present their technical evaluation and... This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to prov... |
|
cena:
652,38 zł |
Introduction to Machine Learning with Applications in Information Security
ISBN: 9781032204925 / Angielski / Twarda / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
325,47 zł |
Iot-Enabled Unobtrusive Surveillance Systems for Smart Campus Safety
ISBN: 9781119903901 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
516,43 zł |
Artificial Intelligence: Ethical, social, and security impacts for the present and the future
ISBN: 9781787783706 / Angielski / Miękka / 342 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
260,13 zł |
Intelligent Technologies and Applications: 4th International Conference, INTAP 2021, Grimstad, Norway, October 11-13, 2021, Revised Selected Papers
ISBN: 9783031105241 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th International Conference on Intelligent Technologies and Applications, INTAP 2021, held in Grimstad, Norway, October 11–13, 2021. The 33 full papers included in this book were carefully reviewed and selected from 243 submissions. They were organized in topical sections as follows: Intelligence, Decision support systems, IoT; Robotics; ML and AI for Intelligent Health, Applications of intelligent technologies in Emergency Management; Smart Electrical Energy Systems, AI and ML in Security; ML and AI for sensing...
This book constitutes the refereed proceedings of the 4th International Conference on Intelligent Technologies and Applications, INTAP 2021, held in G...
|
|
cena:
383,73 zł |
Advances in Security, Networks, and Internet of Things: Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20
ISBN: 9783030710194 / Angielski / Miękka / 902 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major...
The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Con...
|
|
cena:
1074,53 zł |
Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Fifth International Symposium on Software Reliabi
ISBN: 9789811634581 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is a compilation of selected papers from the fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in November 2020 in Beijing, China. The purpose of this symposium is to discuss Inspection, test, certification and research for the software and hardware of Instrument and Control (I&C) systems in nuclear power plants (NPP), such as sensors, actuators and control system. It aims to provide a platform of technical exchange and experience sharing for those broad masses of experts and scholars and... This book is a compilation of selected papers from the fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and... |
|
cena:
575,62 zł |
It Convergence and Security: Proceedings of Icitcs 2021
ISBN: 9789811641206 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book comprises the proceedings of ICITCS 2021. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security are core to most current research, industrial, and commercial activities. Topics covered in this book include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, health care and... This book comprises the proceedings of ICITCS 2021. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. ... |
|
cena:
1343,17 zł |
Principles of Social Networking: The New Horizon and Emerging Challenges
ISBN: 9789811634000 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents new and innovative current discoveries in social networking which contribute enough knowledge to the research community. The book includes chapters presenting research advances in social network analysis and issues emerged with diverse social media data. The book also presents applications of the theoretical algorithms and network models to analyze real-world large-scale social networks and the data emanating from them as well as characterize the topology and behavior of these networks. Furthermore, the book covers extremely debated topics, surveys, future trends,... This book presents new and innovative current discoveries in social networking which contribute enough knowledge to the research community. The boo... |
|
cena:
690,75 zł |
Security Analytics for the Internet of Everything
ISBN: 9781032400693 / Angielski / Miękka / 274 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber challenges. Contributions from leading international experts are included. The target audience for the book is graduate students, professionals, and researchers working in the fields of cybersecurity, computer networks, communications, and the Internet of Everything (IoE). The book also includes some chapters written in a tutorial...
Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapt...
|
|
cena:
232,47 zł |
Cybersecurity and Privacy in Cyber Physical Systems
ISBN: 9781032401515 / Angielski / Miękka / 454 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions addressing related theoretical and practical aspects Improves the reader's awareness of cybersecurity and privacy in CPSs Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs ...
Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to ...
|
|
cena:
232,47 zł |
Fraud Auditing Using Caatt: A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud
ISBN: 9781032401553 / Angielski / Miękka / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assist fraud examiners and auditors in correctly choosing the appropriate audit tests to uncover such various fraud schemes. The book also includes information about audit test red flags to watch out for, a list of recommended controls to help prevent future fraud related incidents, as well as step-by-step demonstrations of a number of common audit tests using IDEA (R) as a CAATT tool.
This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud t...
|
|
cena:
222,13 zł |
Business Process Management: Blockchain, Robotic Process Automation, and Central and Eastern Europe Forum: Bpm 2022 Blockchain, Rpa, and Cee Forum, Mü
ISBN: 9783031161674 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the Blockchain, Robotic Process Management (RPA), and Central and Eastern Europe (CEE) Forum which were held as part of the 20th International Conference on Business Process Management, BPM 2022, which took place in Münster, Germany, during September 11-15, 2022. The Blockchain Forum is dealing with techniques for and applications of blockchains, distributed ledger technologies, and related topics. "The RPA Forum brings together researchers from various communities to discuss challenges, opportunities, and new ideas related to... This book constitutes the proceedings of the Blockchain, Robotic Process Management (RPA), and Central and Eastern Europe (CEE) Forum which were he... |
|
cena:
191,85 zł |
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures
ISBN: 9781032400532 / Angielski / Miękka / 170 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed,...
Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilita...
|
|
cena:
98,12 zł |
MS-700 Managing Microsoft Teams Exam Guide - Second Edition: Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification wi
ISBN: 9781803233383 / Angielski / Miękka / 494 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. MS-700 Managing Microsoft Teams Exam Guide offers complete, up-to-date coverage of the MS-700 exam's objectives along with ample practice questions and explanations, so that you can take the exam with confidence, fully equipped to pass the first time.
MS-700 Managing Microsoft Teams Exam Guide offers complete, up-to-date coverage of the MS-700 exam's objectives along with ample practice questions an...
|
|
cena:
389,45 zł |
The Complete Guide to Cybersecurity Risks and Controls
ISBN: 9781032402550 / Angielski / Miękka / 342 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on... The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technolo... |
|
cena:
222,13 zł |
System of Controls: I.T.'s Guide to Managing Cyber Risk
ISBN: 9780578283760 / Angielski / Twarda / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
173,84 zł |
Citizen Privacy Framework: Case of a Fuzzy-Based Recommender System for Political Participation
ISBN: 9783031060205 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents the concept of a fuzzy-based recommender system for user account privacy settings that can be used for citizen participation on online political platforms. The elaborated components are exemplarily based on the needs of a political platform implemented during the presidential election in Ecuador. The book readdresses the issue of privacy paradox demonstrating that, indeed, users’ actual decisions of being private in most cases diverge with their initial privacy intentions. The two concepts presented in the book - the citizen privacy profile framework and the prototype...
This book presents the concept of a fuzzy-based recommender system for user account privacy settings that can be used for citizen participation on onl...
|
|
cena:
383,73 zł |
Software Security: Concepts & Practices
ISBN: 9781032356310 / Angielski / Twarda / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
620,05 zł |
Perfect Secrecy in Iot: A Hybrid Combinatorial-Boolean Approach
ISBN: 9783031131905 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step... Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious thir... |
|
cena:
383,73 zł |