Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent ...
Continue readingThis book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
Continue readingWith an advent of technology, huge collection of digital images is formed as repositories on crime prevention, medical diagnosis, ...
Continue readingThe comparative study documented here was supported by the Fritz-Thyssen Foundation and the European Commission. It examined ...
Continue readingThis brief sheds light on evolving drug markets and the county lines phenomenon in the British context. Drawing upon empirical ...
Continue readingCrimean-Congo hemorrhagic fever (CCHF) is a tick-borne disease associated with severe hemorrhagic manifestations. CCHF has ...
Continue readingFighting crime breeds emotional responses which often lead to counter-productive government policy. To allow a rational analysis ...
Continue readingCriminal Profiling: Principles and Practice provides a compendium of original scientific research on constructing a criminal ...
Continue readingThis book explores the issue of legitimate criminalization in a modern, liberal society. Coverage provides a comparative ...
Continue readingUnveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...
Continue readingA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Continue readingThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
Continue readingPart 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
Continue readingCyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. ...
Continue readingThis book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by ...
Continue readingThis book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...
Continue readingOffers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...
Continue readingThreats of violence—and especially of homicide—are a too-familiar part of modern life, paralleling stressful conditions ...
Continue readingThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Continue reading