Provides advanced system implementation for Smart Cities using artificial intelligence. It addresses the complete functional ...
Continue reading
Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent ...
Continue readingImportant and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate ...
Continue reading
The development of Internet, mobile communications, distributed computing, computer software and databases storing essential ...
Continue reading
Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive ...
Continue reading
The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue reading
The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue reading
This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...
Continue reading
This Handbook contains surveys of state-of-the-art concepts, systems, applications, best practices as well as contemporary ...
Continue reading
This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
Continue reading
Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
Continue reading
Provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, ...
Continue reading
The book deals with the management of information systems security and privacy, based on a model that covers technological, ...
Continue reading
Practical Internet Security, a professional book, reveals how the Internet is paving the way for secure communications within ...
Continue reading
With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...
Continue reading
Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Continue reading
It will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme ...
Continue reading
The objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...
Continue reading
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Continue reading
The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Continue reading