Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Strategic Innovative Marketing and Tourism
  • Language: en
  • Pages: 1074

Strategic Innovative Marketing and Tourism

​This book covers a very broad range of topics in marketing, communication, and tourism, focusing especially on new perspectives and technologies that promise to influence the future direction of marketing research and practice in a digital and innovational era. Among the areas covered are product and brand management, strategic marketing, B2B marketing and sales management, international marketing, business communication and advertising, digital and social marketing, tourism and hospitality marketing and management, destination branding and cultural management, and event marketing. The book comprises the proceedings of the International Conference on Strategic Innovative Marketing and Tourism (ICSIMAT) 2019, where researchers, academics, and government and industry practitioners from around the world came together to discuss best practices, the latest research, new paradigms, and advances in theory. It will be of interest to a wide audience, including members of the academic community, MSc and PhD students, and marketing and tourism professionals.

ECCWS 2018 17th European Conference on Cyber Warfare and Security V2
  • Language: en
  • Pages: 641
Cybersecurity Policies and Strategies for Cyberwarfare Prevention
  • Language: en
  • Pages: 493

Cybersecurity Policies and Strategies for Cyberwarfare Prevention

  • Type: Book
  • -
  • Published: 2015-07-17
  • -
  • Publisher: IGI Global

Cybersecurity has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cybersecurity Policies and Strategies for Cyberwarfare Prevention serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats. Examining online criminal networks and threats in both the public and private spheres, this book is a necessary addition to the reference collections of IT specialists, administrators, business managers, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.

Research Handbook on Cyberwarfare
  • Language: en
  • Pages: 429

Research Handbook on Cyberwarfare

This Research Handbook provides a rigorous analysis of cyberwarfare, a widely misunderstood field of contemporary conflict and geopolitical competition. Gathering insights from leading scholars and practitioners, it examines the actors involved in cyberwarfare, their objectives and strategies, and scrutinises the impact of cyberwarfare in a world dependent on connectivity.

Security Solutions and Applied Cryptography in Smart Grid Communications
  • Language: en
  • Pages: 485

Security Solutions and Applied Cryptography in Smart Grid Communications

  • Type: Book
  • -
  • Published: 2016-11-29
  • -
  • Publisher: IGI Global

Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use. Security Solutions and Applied Cryptography in Smart Grid Communications is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is ideally designed for academicians, researchers, engineers and students seeking current research on ways in which to implement smart grid platforms all over the globe.

ECCWS2015-Proceedings of the 14th European Conference on Cyber Warfare and Security 2015
  • Language: en
  • Pages: 467

ECCWS2015-Proceedings of the 14th European Conference on Cyber Warfare and Security 2015

Complete proceedings of the 14th European Conference on Cyber Warfare and Security Hatfield UK Published by Academic Conferences and Publishing International Limited

Advances in Computer Science and Information Technology. Networks and Communications
  • Language: en
  • Pages: 671

Advances in Computer Science and Information Technology. Networks and Communications

  • Type: Book
  • -
  • Published: 2012-04-23
  • -
  • Publisher: Springer

The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security.

Handbook of Research on Multimedia Cyber Security
  • Language: en
  • Pages: 372

Handbook of Research on Multimedia Cyber Security

  • Type: Book
  • -
  • Published: 2020-04-03
  • -
  • Publisher: IGI Global

Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In spite of the opportunities that multimedia creates for businesses and companies, information sharing remains vulnerable to cyber attacks and hacking due to the open channels in which this data is being transmitted. Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data. The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.

An Approach to Modelling Software Evolution Processes
  • Language: en
  • Pages: 228

An Approach to Modelling Software Evolution Processes

An Approach to Modelling Software Evolution Processes describes formal software processes that effectively support software evolution. The importance and popularity of software evolution increase as more and more successful software systems become legacy systems. For one thing, software evolution has become an important characteristic in the software life cycle; for another, software processes play an important role in increasing efficiency and quality of software evolution. Therefore, the software evolution process, the inter-discipline of software process and software evolution, becomes a key area in software engineering. The book is intended for software engineers and researchers in computer science. Prof. Tong Li earned his Ph.D. in Software Engineering at De Montfort University, U.K.; he has published five monographs and over one hundred papers.

Foundations of Information Ethics
  • Language: en
  • Pages: 169

Foundations of Information Ethics

Foreword by Robert Hauptman As discussions about the roles played by information in economic, political, and social arenas continue to evolve, the need for an intellectual primer on information ethics that also functions as a solid working casebook for LIS students and professionals has never been more urgent. This text, written by a stellar group of ethics scholars and contributors from around the globe, expertly fills that need. Organized into twelve chapters, making it ideal for use by instructors, this volume from editors Burgess and Knox thoroughly covers principles and concepts in information ethics, as well as the history of ethics in the information professions; examines human rights...