Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Internet Censorship and Regulation Systems in Democracies: Emerging Research and Opportunities
  • Language: en
  • Pages: 272

Internet Censorship and Regulation Systems in Democracies: Emerging Research and Opportunities

  • Type: Book
  • -
  • Published: 2020-05-08
  • -
  • Publisher: IGI Global

As the internet has been regulated from its conception, many widespread beliefs regarding internet freedom are actually misconceptions. Additionally, there are already two main categories of internet regulation systems in use: the open and the silent IRSs. Unexpectedly, the former are quite popular among authoritarian regimes, while the latter are implemented mainly in Western democracies. Many IT experts and media analysts criticize Western governments’ choice to use a silent IRS, expressing their fear that this could set a dangerous precedent for the rest of the democratic countries around the world. New regulation systems must be developed and implemented that are more acceptable to the...

Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications
  • Language: en
  • Pages: 2215

Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications

  • Type: Book
  • -
  • Published: 2018-10-05
  • -
  • Publisher: IGI Global

The censorship and surveillance of individuals, societies, and countries have been a long-debated ethical and moral issue. In consequence, it is vital to explore this controversial topic from all angles. Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications is a vital reference source on the social, moral, religious, and political aspects of censorship and surveillance. It also explores the techniques of technologically supported censorship and surveillance. Highlighting a range of topics such as political censorship, propaganda, and information privacy, this multi-volume book is geared towards government officials, leaders, professionals, policymakers, media specialists, academicians, and researchers interested in the various facets of censorship and surveillance.

Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems
  • Language: en
  • Pages: 501

Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems

  • Type: Book
  • -
  • Published: 2020-05-22
  • -
  • Publisher: IGI Global

Safety and security are crucial to the operations of nuclear power plants, but cyber threats to these facilities are increasing significantly. Instrumentation and control systems, which play a vital role in the prevention of these incidents, have seen major design modifications with the implementation of digital technologies. Advanced computing systems are assisting in the protection and safety of nuclear power plants; however, significant research on these computational methods is deficient. Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems is a pivotal reference source that provides vital research on the digital developments of instrumentation and control...

Handbook of Research on Intrusion Detection Systems
  • Language: en
  • Pages: 407

Handbook of Research on Intrusion Detection Systems

  • Type: Book
  • -
  • Published: 2020-02-07
  • -
  • Publisher: IGI Global

Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

Handbook of Research on Multimedia Cyber Security
  • Language: en
  • Pages: 372

Handbook of Research on Multimedia Cyber Security

  • Type: Book
  • -
  • Published: 2020-04-03
  • -
  • Publisher: IGI Global

Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In spite of the opportunities that multimedia creates for businesses and companies, information sharing remains vulnerable to cyber attacks and hacking due to the open channels in which this data is being transmitted. Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data. The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.

Romantik 2020
  • Language: en
  • Pages: 148

Romantik 2020

  • Type: Book
  • -
  • Published: 2021-10-11
  • -
  • Publisher: V&R unipress

“Romantik. Journal for the Study of Romanticisms” is a multidisciplinary journal dedicated to the study of romantic-era cultural productions and concepts. The journal promotes innovative research across disciplinary borders. It aims to advance new historical discoveries, forward-looking theoretical insights and cutting-edge methodological approaches. The articles range over the full variety of cultural practices, including the written word, visual arts, history, philosophy, religion, and theatre during the romantic period (c. 1780–1840). But contributions to the discussion of pre- or post-romantic representations are also welcome. Since the romantic era was characterized by an emphasis on the vernacular, the title of journal has been chosen to reflect the Germanic root of the word. But the journal is interested in all European romanticisms – and not least the connections and disconnections between them – hence, the use of the plural in the subtitle. Romantik is a peer-reviewed journal supported by the Nordic Board for Periodicals in the Humanities and Social Sciences (NOP-HS).

Applied Approach to Privacy and Security for the Internet of Things
  • Language: en
  • Pages: 295

Applied Approach to Privacy and Security for the Internet of Things

  • Type: Book
  • -
  • Published: 2020-06-26
  • -
  • Publisher: IGI Global

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research o...

Quantum Cryptography and the Future of Cyber Security
  • Language: en
  • Pages: 343

Quantum Cryptography and the Future of Cyber Security

  • Type: Book
  • -
  • Published: 2020-01-03
  • -
  • Publisher: IGI Global

The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum Cryptography and the Future of Cyber Security is an essential scholarly resource that provides the latest research and advancements in cryptography and cyber security through quantum applications. Highlighting a wide range of topics such as e-commerce, machine learning, and privacy, this book is ideal for security analysts, systems engineers, software security engineers, data scientists, vulnerability analysts, professionals, academicians, researchers, security professionals, policymakers, and students.

Impact of Digital Transformation on Security Policies and Standards
  • Language: en
  • Pages: 215

Impact of Digital Transformation on Security Policies and Standards

  • Type: Book
  • -
  • Published: 2019-12-27
  • -
  • Publisher: IGI Global

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standa...

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks
  • Language: en
  • Pages: 405

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks

  • Type: Book
  • -
  • Published: 2020-06-12
  • -
  • Publisher: IGI Global

Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides...