(Ilmumisaeg: 19-Jan-2020, Hardback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662603581)
This book deals with computer performance by addressing basic preconditions. Besides general considerations about performance, several new approaches are presented. One of them targets memory structures by introducing the possibility of overlap...Loe edasi...
This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network....Loe edasi...
This work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to behave in a certain way. This book explores privacy...Loe edasi...
Andy Taylor, David Alexander, Amanda Finch, David Sutton, Andy Taylor
(Ilmumisaeg: 15-Jan-2020, Paperback / softback, Kirjastus: BCS, The Chartered Institute for IT, ISBN-13: 9781780175188)
This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Secu...Loe edasi...
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retin...Loe edasi...
This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security r...Loe edasi...
(Ilmumisaeg: 13-Jan-2020, Hardback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789811204456)
In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges. While the internet has created a global platform for the exchange of ideas, goods and ser...Loe edasi...
(Ilmumisaeg: 13-Jan-2020, Hardback, Kirjastus: Apple Academic Press Inc., ISBN-13: 9781771888103)
This book has a two-fold mission: to explain and facilitate digital transition in business organizations using information and communications technology and to address the associated growing threat of cyber crime and the challenge of creating and...Loe edasi...
This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologie...Loe edasi...
The MS-101 exam is part of the Microsoft 365 Certified: Enterprise Administrator Expert certification path in which users learn to evaluate, plan, migrate, deploy, and manage Microsoft 365 services. This book offers complete, up-to-date coverag...Loe edasi...
The subjects of this volume are more relevant than ever, especially in light of the raft of electoral scandals concerning voter profiling. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions,...Loe edasi...
This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world. This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the...Loe edasi...
Big Data, gathered together and re-analysed, can be used to form endless variations of our persons - so-called ‘data doubles’. Whilst never a precise portrayal of who we are, they unarguably contain glimpses of details about us that, when deployed...Loe edasi...
CSS in easy steps, 4th edition begins by explaining how Cascading Style Sheets (CSS) can determine the presentation of elements within HTML documents. Examples show how style sheet rules can control content position and appearance...Loe edasi...
This book gathers selected high-quality research papers presented at the Fourth International Congress on Information and Communication Technology, held at Brunel University, London, on February 27-28, 2019....Loe edasi...
Learn to engineer privacy into software, systems, and applications. This book is a resource for developers, engineers, architects, and coders. It provides tools, methodologies, templates, worksheets and guidance on engineering privacy into softw...Loe edasi...
Learn how to design, develop, and deploy smart contracts on the Ethereum blockchain. With this practical book, software developers with a high-level understanding of the blockchain will use the Solidity programming language to write decentraliz...Loe edasi...
As a decentralized ledger platform, Corda shares several characteristics with blockchain. But Corda&;s design serves large enterprises, especially financials such as insurance, trading, and trade finance that require data privacy and perm...Loe edasi...