(Ilmumisaeg: 19-Jan-2020, Hardback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662603581)
This book deals with computer performance by addressing basic preconditions. Besides general considerations about performance, several new approaches are presented. One of them targets memory structures by introducing the possibility of overlap...Loe edasi...
This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network....Loe edasi...
Andy Taylor, David Alexander, Amanda Finch, David Sutton, Andy Taylor
(Ilmumisaeg: 15-Jan-2020, Paperback / softback, Kirjastus: BCS, The Chartered Institute for IT, ISBN-13: 9781780175188)
This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Secu...Loe edasi...
This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security r...Loe edasi...
(Ilmumisaeg: 13-Jan-2020, Hardback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789811204456)
In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges. While the internet has created a global platform for the exchange of ideas, goods and ser...Loe edasi...
(Ilmumisaeg: 13-Jan-2020, Hardback, Kirjastus: Apple Academic Press Inc., ISBN-13: 9781771888103)
This book has a two-fold mission: to explain and facilitate digital transition in business organizations using information and communications technology and to address the associated growing threat of cyber crime and the challenge of creating and...Loe edasi...
This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologie...Loe edasi...
The subjects of this volume are more relevant than ever, especially in light of the raft of electoral scandals concerning voter profiling. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions,...Loe edasi...
This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world. This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the...Loe edasi...
CSS in easy steps, 4th edition begins by explaining how Cascading Style Sheets (CSS) can determine the presentation of elements within HTML documents. Examples show how style sheet rules can control content position and appearance...Loe edasi...
This book identifies and explains the different national approaches to data protection - the legal regulation of the collection, storage, transmission and use of information concerning identified or identifiable individuals - and determines the...Loe edasi...
This book gathers selected high-quality research papers presented at the Fourth International Congress on Information and Communication Technology, held at Brunel University, London, on February 27-28, 2019....Loe edasi...
Learn to engineer privacy into software, systems, and applications. This book is a resource for developers, engineers, architects, and coders. It provides tools, methodologies, templates, worksheets and guidance on engineering privacy into softw...Loe edasi...
Learn how to design, develop, and deploy smart contracts on the Ethereum blockchain. With this practical book, software developers with a high-level understanding of the blockchain will use the Solidity programming language to write decentraliz...Loe edasi...
As a decentralized ledger platform, Corda shares several characteristics with blockchain. But Corda&;s design serves large enterprises, especially financials such as insurance, trading, and trade finance that require data privacy and perm...Loe edasi...
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features * Covers the latest security threats and defense strategies for 2020 * Introduces techniques and skill...Loe edasi...
(Ilmumisaeg: 30-Dec-2019, Hardback, Kirjastus: Business Science Reference, ISBN-13: 9781799817635)
Examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data. The book highli...Loe edasi...