Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Applications of Encryption and Watermarking for Information Security
  • Language: en
  • Pages: 262

Applications of Encryption and Watermarking for Information Security

  • Type: Book
  • -
  • Published: 2023-03-27
  • -
  • Publisher: IGI Global

In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. Therefore, in the fields of information security, data encryption, and watermarking, there exists a need for a collection of original research in this area. Applications of Encryption and Watermarking for Information Security provides relevant theoretical frameworks and the latest empirical research findings in the domains of security and privacy. It is written for professionals who want to improve their underst...

Verification and Evaluation of Computer and Communication Systems
  • Language: en
  • Pages: 218

Verification and Evaluation of Computer and Communication Systems

  • Type: Book
  • -
  • Published: 2017-08-15
  • -
  • Publisher: Springer

​This book constitutes the proceedings of the 11th International Conference International Conference on Verification and Evaluation of Computer and Communication Systems ( VECoS 2017 ), held at Concordia University, Montreal, Canada, in August 2017. The 13 full papers, together with 3 abstracts in this volume were carefully reviewed and selected from 35 submissions. The aim of the VECoS conference is to bring together researchers and practitioners in the areas of verification, control, performance and dependability evalu-ation in order to discuss state-of-the-art and challenges in modern computer and communication systems in which functional and extra-functional properties are strongly interrelated. Thus, the main motivation for VECoS is to encourage the cross-fertilization between various formal verification and evaluation approaches, methods and techniques, and especially those developed for concurrent and dis-tributed hardware/software systems.

Protecting User Privacy in Web Search Utilization
  • Language: en
  • Pages: 360

Protecting User Privacy in Web Search Utilization

  • Type: Book
  • -
  • Published: 2023-04-25
  • -
  • Publisher: IGI Global

Online user privacy is a delicate issue that has been unfortunately overlooked by technology corporations and especially the public since the birth of the internet. Many online businesses and services such as web search engines, retailers, and social network sites exploit user data for profit. There is a misconception among people about the term “privacy.” Usually, people think that privacy is the ability of an individual to isolate themselves or that it is a person’s right to control access to their personal information. However, privacy is not just about revealing secret information; it also includes exploiting user personal data, as the exploitation of personal data may lead to disa...

Effective Cybersecurity Operations for Enterprise-Wide Systems
  • Language: en
  • Pages: 343

Effective Cybersecurity Operations for Enterprise-Wide Systems

  • Type: Book
  • -
  • Published: 2023-06-12
  • -
  • Publisher: IGI Global

Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage to their hardware, software, or electronic data; as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly critical due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and Wi-Fi, and the growth of "smart" devices, which constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and techno...

Freedom in the World 2021
  • Language: en
  • Pages: 1547

Freedom in the World 2021

Freedom in the World, the Freedom House flagship survey whose findings have been published annually since 1972, is the standard-setting comparative assessment of global political rights and civil liberties. The survey ratings and narrative reports on 195 countries and fifteen territories are used by policymakers, the media, international corporations, civic activists, and human rights defenders to monitor trends in democracy and track improvements and setbacks in freedom worldwide. The Freedom in the World political rights and civil liberties ratings are determined through a multi-layered process of research and evaluation by a team of regional analysts and eminent scholars. The analysts use...

Handbook of Research on Cybersecurity Risk in Contemporary Business Systems
  • Language: en
  • Pages: 467

Handbook of Research on Cybersecurity Risk in Contemporary Business Systems

  • Type: Book
  • -
  • Published: 2023-03-27
  • -
  • Publisher: IGI Global

The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and wi-fi, and the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. The Handbook of Research on Cybersecurity Risk in Contemporary Business Systems examines current risks involved in the cybersecurity of various business systems today from a global perspective and investigates critical business systems. Covering key topics such as artificial intelligence, hacking, and software, this reference work is ideal for computer scientists, industry professionals, policymakers, researchers, academicians, scholars, instructors, and students.

Handbook of Research on Data Science and Cybersecurity Innovations in Industry 4.0 Technologies
  • Language: en
  • Pages: 649

Handbook of Research on Data Science and Cybersecurity Innovations in Industry 4.0 Technologies

  • Type: Book
  • -
  • Published: 2023-09-21
  • -
  • Publisher: IGI Global

Disruptive innovations are now propelling Industry 4.0 (I4.0) and presenting new opportunities for value generation in all major industry segments. I4.0 technologies' innovations in cybersecurity and data science provide smart apps and services with accurate real-time monitoring and control. Through enhanced access to real-time information, it also aims to increase overall effectiveness, lower costs, and increase the efficiency of people, processes, and technology. The Handbook of Research on Data Science and Cybersecurity Innovations in Industry 4.0 Technologies discusses the technological foundations of cybersecurity and data science within the scope of the I4.0 landscape and details the existing cybersecurity and data science innovations with I4.0 applications, as well as state-of-the-art solutions with regard to both academic research and practical implementations. Covering key topics such as data science, blockchain, and artificial intelligence, this premier reference source is ideal for industry professionals, computer scientists, scholars, researchers, academicians, practitioners, instructors, and students.

Information Security and Privacy in Smart Devices: Tools, Methods, and Applications
  • Language: en
  • Pages: 343

Information Security and Privacy in Smart Devices: Tools, Methods, and Applications

  • Type: Book
  • -
  • Published: 2023-04-03
  • -
  • Publisher: IGI Global

In recent years, smart devices have become commonplace in our daily lives. On the internet of things (IoT), these devices powered new intelligent services. Their application enabled the rise of intelligent cities, smart agriculture, and Industry 4.0. However, smart devices collect and share large amounts of data, including the habits and preferences of their users. Cybersecurity incidents in intelligent environments may impact services used by millions across the world and make private information public. Information Security and Privacy in Smart Devices: Tools, Methods, and Applications presents research challenges, innovative insights, and trends related to solutions, methods, processes, and applications for maintaining information security and privacy in intelligent environments. Covering topics such as information retrieval methods, electronic health records, and misinformation detection, this premier reference source is an excellent resource for security professionals, government officials, business leaders and executives, IT managers, hospital administrators, students of higher education, librarians, researchers, and academicians.

Recording History
  • Language: en
  • Pages: 376

Recording History

A new history of twentieth-century North Africa, that gives voice to the musicians who defined an era and the vibrant recording industry that carried their popular sounds from the colonial period through decolonization. If twentieth-century stories of Jews and Muslims in North Africa are usually told separately, Recording History demonstrates that we have not been listening to what brought these communities together: Arab music. For decades, thousands of phonograph records flowed across North African borders. The sounds embedded in their grooves were shaped in large part by Jewish musicians, who gave voice to a changing world around them. Their popular songs broadcast on radio, performed in ...

Verification and Evaluation of Computer and Communication Systems
  • Language: en
  • Pages: 192

Verification and Evaluation of Computer and Communication Systems

This book constitutes the refereed proceedings of the 16th International Conference on Verification and Evaluation of Computer and Communication Systems, VECoS 2023, held in Marrakech, Morocco, during October 18–20, 2023. The 12 full papers included in this book were carefully reviewed and selected from 36 submissions. The topics presented covered a range of subjects, including approaches to improving the scalability and efficiency of formal verification and their applications to blockchain, smart contracts and neural networks.