You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book is the tenth in a series presenting research papers arising from MSc/MRes research projects undertaken by students of the School of Computing and Mathematics at Plymouth University. The publications in this volume are based upon research projects that were undertaken during the 2011/12 academic year. A total of 25 papers are presented, covering many aspects of modern networking and communication technology, including security, mobility, coding schemes and quality measurement. The expanded topic coverage compared to earlier volumes in this series reflects the broadening of our range of MSc programmes. Specifically contributing programmes are: Communications Engineering and Signal Processing, Computer and Information Security, Network Systems Engineering, and Robotics.
This book is the ninth in a series presenting research papers arising from MSc/MRes research projects undertaken by students of the School of Computing and Mathematics at Plymouth University. The publications in this volume are based upon research projects that were undertaken during the 2010/11 academic year. A total of 24 papers are presented, covering many aspects of modern networking and communication technology, including security, mobility, coding schemes and quality measurement. The expanded topic coverage compared to earlier volumes in this series reflects the broadening of our range of MSc programmes. Specifically contributing programmes are: Communications Engineering and Signal Processing, Computer and Information Security, Computer Science, Computing, Network Systems Engineering, and Robotics.
This book is the eighth in a series presenting research papers arising from MSc/MRes research projects undertaken by students of the School of Computing and Mathematics at Plymouth University. The publications in this volume are based upon research projects that were undertaken during the 2009/10 academic year. A total of 30 papers are presented, covering many aspects of modern networking and communication technology, including security, mobility, coding schemes and quality measurement. The expanded topic coverage compared to earlier volumes in this series reflects the broadening of our range of MSc programmes. Specifically contributing programmes are: Communications Engineering and Signal Processing, Computer and Information Security, Computer Science, Network Systems Engineering, Robotics, and Web Applications Development.
How would your organization cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer forensics! The primary purpose of computer forensics is to enable organizations to pinpoint where the malware has infected their computer systems and which files have been infected, so that they can close the vulnerability. More and more organizations have realised that they need to acquire a forensic capability to ensure they are ready to cope with an information security incident. This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organization. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required. Benefits to business include: Defend your company effectively against attacks - By developing a computer forensic capability, your organisation will
This book is the eleventh in a series presenting research papers arising from MSc/MRes research projects undertaken by students of the School of Computing and Mathematics at Plymouth University. The publications in this volume are based upon research projects that were undertaken during the 2012/13 academic year. A total of 15 papers are presented, covering many aspects of modern networking and communication technology, including security, mobility, coding schemes and quality measurement. The expanded topic coverage compared to earlier volumes in this series reflects the broadening of our range of MSc programmes. Specifically contributing programmes are: Communications Engineering and Signal Processing, Computer and Information Security, Computer Science, Network Systems Engineering, and Robotics.
The Human Aspects of Information Security and Assurance (HAISA) symposium specifically addresses information security issues that relate to people. It concerns the methods that inform and guide users' understanding of security, and the technologies that can benefit and support them in achieving protection. This book represents the proceedings from the 2014 event, which was held in Plymouth, UK. A total of 20 reviewed papers are included, spanning a range of topics including the communication of risks to end-users, user-centred security in system development, and technology impacts upon personal privacy. All of the papers were subject to double-blind peer review, with each being reviewed by at least two members of the international programme committee.
This book represents the proceedings from the information security multi-conference (EISMC). All of the papers were subject to double-blind peer review, with each being reviewed by at least two members of the international programme committee.