Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent ...
اقرأ المزيدContains new examples and material highlighting the emergence of mobile computing and the cloud. It explores this generational ...
اقرأ المزيدProvides an up-to-date survey of developments in computer security. Central problems that confront security designers and ...
اقرأ المزيدThis textbook is intended for practical, laboratory sessions associated with the course of quantum computing and quantum ...
اقرأ المزيدThis comprehensive volume the inclusion of several case studies serves to examine pertinent topics, namely computer-based ...
اقرأ المزيدCorporate social responsibility, sustainability, and citizenship are terms that often evoke considerable scepticism and cynicism, ...
اقرأ المزيدDistributed client/server architectures are the technological backbone of today’s data centres. A usage-based allocation ...
اقرأ المزيدContingent valuation is one of the means of incorporating socio-environmental considerations in cost–benefit analysis. ...
اقرأ المزيدThe book constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel ...
اقرأ المزيدThe renowned Cranbrook Academy of Art near Detroit, Michigan, has been described as the epicentre of American Modernism. ...
اقرأ المزيدThis paper presents a comprehensive crime detection system that uses a combination of hardware and software to monitor homes ...
اقرأ المزيدThis book explores the impact of Covid-19 on universities, and how students, staff, faculty and academic leaders have adapted ...
اقرأ المزيدThis book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures ...
اقرأ المزيدInvestment platforms are challenging the grip of massive business on the venture sector and are providing new means of power ...
اقرأ المزيدExplores the emergence of a decentralised and disintermediated crypto-market and investigates the way in which it can transform ...
اقرأ المزيدIntroduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
اقرأ المزيدThis book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second ...
اقرأ المزيدImportant and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate ...
اقرأ المزيدThis book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by ...
اقرأ المزيدThe development of Internet, mobile communications, distributed computing, computer software and databases storing essential ...
اقرأ المزيد