You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In an era defined by the pervasive integration of digital systems across industries, the paramount concern is the safeguarding of sensitive information in the face of escalating cyber threats. Contemporary Challenges for Cyber Security and Data Privacy stands as an indispensable compendium of erudite research, meticulously curated to illuminate the multifaceted landscape of modern cybercrime and misconduct. As businesses and organizations pivot towards technological sophistication for enhanced efficiency, the specter of cybercrime looms larger than ever. In this scholarly research book, a consortium of distinguished experts and practitioners convene to dissect, analyze, and propose innovativ...
In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presen...
In recent years, industries have shifted into the digital domain, as businesses and organizations have used various forms of technology to aid information storage and efficient production methods. Because of these advances, the risk of cybercrime and data security breaches has skyrocketed. Fortunately, cyber security and data privacy research are thriving; however, industry experts must keep themselves updated in this field. Exploring Cyber Criminals and Data Privacy Measures collects cutting-edge research on information security, cybercriminals, and data privacy. It proposes unique strategies for safeguarding and preserving digital information using realistic examples and case studies. Covering key topics such as crime detection, surveillance technologies, and organizational privacy, this major reference work is ideal for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students.
The International Conference on Science, Engineering and Technology Practices for Sustainable Development (ICSETPSD-23) brought researchers, scientists, engineers, industrial professionals, and scholar students for the dissemination of original research results, new ideas, and practical development experiences which concentrate on both theory and practices from around the world in all the areas of science, engineering, and technology practices for sustainable development. The theme of ICSETPSD-23 was “Science, Engineering and Technology for sustainable development”. The technical program of ICSETPSD-23 consisted of 140 full papers, scheduled for oral presentation sessions at the main con...
This book provides an effective overview of the state-of-the art in software engineering, with a projection of the future of the discipline. It includes 13 papers, written by leading researchers in the respective fields, on important topics like model-driven software development, programming language design, microservices, software reliability, model checking and simulation. The papers are edited and extended versions of the presentations at the PAUSE symposium, which marked the completion of 14 years of work at the Chair of Software Engineering at ETH Zurich. In this inspiring context, some of the greatest minds in the field extensively discussed the past, present and future of software engineering. It guides readers on a voyage of discovery through the discipline of software engineering today, offering unique food for thought for researchers and professionals, and inspiring future research and development.
Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. The book contains sixteen chapters which deal with security and privacy issues in computing and communication networks, quantum cryptography and the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography. It will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.
Collection of 120 peer-reviewed papers that were presented at the 3rd International Conference on Advanced Research in Virtual and Rapid Prototyping, held in Leiria, Portugal in September 2007. Essential reading for all those working on V&RP, focused on inducing increased collaboration between industry and academia. In addition to key
Multimedia signals include different data types (text, sound, graphics, picture, animations, video, etc.), which can be time-dependent (sound, video and animation) or spatially-dependent (images, text and graphics). Hence, the multimedia systems represent an interdisciplinary cross-section of the following areas: digital signal processing, computer architecture, computer networks and telecommunications. Multimedia Signals and Systems is an introductory text, designed for students or professionals and researchers in other fields, with a need to learn the basics of signals and systems. A considerable emphasis is placed on the analysis and processing of multimedia signals (audio, images, video). Additionally, the book connects these principles to other important elements of multimedia systems such as the analysis of optical media, computer networks, QoS, and digital watermarking.
One of the biggest challenges for organizations that have adopted microservice architecture is the lack of architectural, operational, and organizational standardization. After splitting a monolithic application or building a microservice ecosystem from scratch, many engineers are left wondering what’s next. In this practical book, author Susan Fowler presents a set of microservice standards in depth, drawing from her experience standardizing over a thousand microservices at Uber. You’ll learn how to design microservices that are stable, reliable, scalable, fault tolerant, performant, monitored, documented, and prepared for any catastrophe. Explore production-readiness standards, includi...