This book provides a detailed exploration of the British media coverage of the press reform debate that arose from the News ...
اقرأ المزيد
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces ...
اقرأ المزيد
Unveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...
اقرأ المزيد
Offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...
اقرأ المزيد
This book presents the position that the online environment is a significant and relevant theater of activity in the fight ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...
اقرأ المزيد
Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
اقرأ المزيد
This book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses ...
اقرأ المزيد
This book presents a number of the latest academic insights into new collaborative modes of city making that are firmly rooted ...
اقرأ المزيد
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
اقرأ المزيدHacking Detection using AI is a hot research topic. There are two types of Intrusion Detection Systems (IDS), Network IDS(NIDS) ...
اقرأ المزيد