Provides advanced system implementation for Smart Cities using artificial intelligence. It addresses the complete functional ...
اقرأ المزيد
Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent ...
اقرأ المزيدImportant and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate ...
اقرأ المزيد
The development of Internet, mobile communications, distributed computing, computer software and databases storing essential ...
اقرأ المزيد
Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive ...
اقرأ المزيد
The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...
اقرأ المزيد
This Handbook contains surveys of state-of-the-art concepts, systems, applications, best practices as well as contemporary ...
اقرأ المزيد
This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
اقرأ المزيد
Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
اقرأ المزيد
Provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, ...
اقرأ المزيد
The book deals with the management of information systems security and privacy, based on a model that covers technological, ...
اقرأ المزيد
Practical Internet Security, a professional book, reveals how the Internet is paving the way for secure communications within ...
اقرأ المزيد
With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...
اقرأ المزيد
Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
اقرأ المزيد
It will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme ...
اقرأ المزيد
The objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...
اقرأ المزيد
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
اقرأ المزيد
The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
اقرأ المزيد