Provides advanced system implementation for Smart Cities using artificial intelligence. It addresses the complete functional ...
Continue readingSecurity is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent ...
Continue readingImportant and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate ...
Continue readingThe development of Internet, mobile communications, distributed computing, computer software and databases storing essential ...
Continue readingLemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive ...
Continue readingThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThis book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...
Continue readingThis Handbook contains surveys of state-of-the-art concepts, systems, applications, best practices as well as contemporary ...
Continue readingThis book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
Continue readingGives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
Continue readingProvides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, ...
Continue readingThe book deals with the management of information systems security and privacy, based on a model that covers technological, ...
Continue readingPractical Internet Security, a professional book, reveals how the Internet is paving the way for secure communications within ...
Continue readingWith our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...
Continue readingData science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Continue readingIt will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme ...
Continue readingThe objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...
Continue readingInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Continue readingThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Continue reading