You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Examines the governance challenges of cybersecurity through twelve, real-world case studies Through twelve detailed case studies, this superb collection provides an overview of the ways in which government officials and corporate leaders across the globe are responding to the challenges of cybersecurity. Drawing perspectives from industry, government, and academia, the book incisively analyzes the actual issues, and provides a guide to the continually evolving cybersecurity ecosystem. It charts the role that corporations, policymakers, and technologists are playing in defining the contours of our digital world. Rewired: Cybersecurity Governance places great emphasis on the interconnection of...
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
The practice of armed conflict has changed radically in the last decade. With eminent contributors from legal, government and military backgrounds, this Research Handbook addresses the legal implications of remote warfare and its significance for combatants, civilians, policymakers and international lawyers.
This book constitutes the refereed proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2014, held in Egham, UK, in July 2014. The 13 revised full papers presented together with one extended abstract were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on malware, mobile security, network security and host security.
This book constitutes the proceedings of the 6th International ICST Conference, TridentCom 2010, held in Berlin, Germany, in May 2010. Out of more than 100 submitted contributions the Program Committee finally selected 15 full papers, 26 practices papers, and 22 posters. They focus on topics as Internet testbeds, future Internet research, wireless sensors, media and mobility, and monitoring in large scale testbeds.
This important reference work is an extensive, up-to-date resource for students who want to investigate the world of cybercrime or for those seeking further knowledge of specific attacks both domestically and internationally. Cybercrime is characterized by criminal acts that take place in the borderless digital realm. It takes on many forms, and its perpetrators and victims are varied. From financial theft, destruction of systems, fraud, corporate espionage, and ransoming of information to the more personal, such as stalking and web-cam spying as well as cyberterrorism, this work covers the full spectrum of crimes committed via cyberspace. This comprehensive encyclopedia covers the most note...
None
None
Im Namen der DFN-CERT Services GmbH und des Programm-Komitees präsentieren wir Ihnen den Workshopband zum 19. DFN Workshop „Sicherheit in vernetzten Systemen“ in Hamburg. Seit 1994 jährlich stattfindend, hat er sich mit seiner betont technischen und wissenschaftlichen Ausrichtung als eine der größten deutschen Sicherheitstagungen etabliert. In diesem Band finden Sie die Langfassungen der ausgewählten Beiträge bzw. der Redner auf der Tagung.