You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security. This publication offers a comprehensive, in-depth analysis of encryption solutions and will be of particular interest to IT professionals, cryptologists, and researchers in the field.
Across a variety of disciplines, data and statistics form the backbone of knowledge. To ensure the reliability and validity of data, appropriate measures must be taken in conducting studies and reporting findings. Research Methods: Concepts, Methodologies, Tools, and Applications compiles chapters on key considerations in the management, development, and distribution of data. With its focus on both fundamental concepts and advanced topics, this multi-volume reference work will be a valuable addition to researchers, scholars, and students of science, mathematics, and engineering.
Organizations, governments, and corporations are all concerned with distributing their goods and services to those who need them most, consequently benefiting in the process. Only by carefully considering the interrelated nature of social systems can organizations achieve the success they strive for. Economics: Concepts, Methodolgies, Tools, and Applications explores the interactions between market agents and their impact on global prosperity. Incorporating both theoretical background and advanced concepts in the discipline, this multi-volume reference is intended for policymakers, economists, business leaders, governmental and non-governmental organizations, and students of economic theory.
Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations. The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.
Data collection allows todays businesses to cater to each customers individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks of valuable customer information. Highlighting the legal aspects of identity protection, trust and security, and detection techniques, this comprehensive work is a valuable resource for any business, legal, or technology professional looking to improve information security within their organization.
This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest developments in mobile software development.
Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. The Handbook of Research on Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Symposium on Intelligent Informatics (ISI 2013) held in Mysore, India during August 23-24, 2013. The 47 revised papers presented were carefully reviewed and selected from 126 initial submissions. The papers are organized in topical sections on pattern recognition, signal and image processing; data mining, clustering and intelligent information systems; multi agent systems; and computer networks and distributed systems. The book is directed to the researchers and scientists engaged in various fields of intelligent informatics.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers.
To ensure its protection from enemies both foreign and domestic, a government must invest resources and personnel toward the goal of homeland security. It is through these endeavors that citizens are able to live out their lives in peace. Cases on Research and Knowledge Discovery: Homeland Security Centers of Excellence presents a series of studies and descriptive examples on the US Department of Homeland Security and related research. Through its investigation of interesting challenges and thought-provoking ideas, this volume offers professionals, researchers, and academics in the fields of security science, engineering, technology, and mathematics an in-depth discussion of some of the issues that directly affect the safety, security, and prosperity of the nation.