You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book is aimed at managerial decision makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics. To accomplish this, the editors drew upon the combined cognitive intelligence of 46 scholars from 11 countries to present the state of the art in cybersecurity. Managers and leaders at all levels in organizations around the globe will find the explanations and suggestions useful for understanding cybersecurity risks as well as formulating strategies to mitigate future problems. Employees will find the examples and caveats both interesting as well as practical for e...
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.
Compounded with the emergence of information technology, information services have become more complex. In order to break the bottleneck in providing information services, the information behavior of the user community must be studied and library staff must be effectively trained to identify, adapt, and satisfy the information needs of every type of information seeker. Innovations in the Designing and Marketing of Information Services provides emerging research exploring the theoretical and practical aspects of improving and expanding information resources and services in a cost-effective way and enables librarians to plan and present information services for the betterment of civil society. Featuring coverage on a broad range of topics such as e-resources, knowledge ethics, and user-friendly technology, this book is ideally designed for librarians, information scientists, behavioral scientists, information technologists, marketers, marketing executives, academicians, researchers, and students.
The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it. This Open Access Pivot explores these challenges, presenting the state of the art and future directions for research but also frameworks for making sense of this complex area. This book provides a variety of perspectives on how technology innovations such as fog, edge and dew computing, 5G networks, and distributed intelligence are making us rethink conventional cloud computing to support th...
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy ph...
Advances in Accounting Behavioral Research addresses a wide range of issues that affect the users, preparers and assurers of accounting information. Volume 17 exemplifies this focus by including chapters on decision making under rules versus principal based standards, white collar crime and group versus individual decision making.
Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using exampl...
This proceedings volume brings together selected peer-reviewed papers presented at the 2014 International Conference on Frontier of Energy and Environment Engineering. Topics covered include energy efficiency and energy management, energy exploration and exploitation, power generation technologies, water pollution and protection, air pollution and
Print-on-demand version