Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
In this edited book, the authors delineate the challenges of building accountability into the Internet of Things and solutions for delivering on this critical societal challenge. They explain how the accountability principle impacts IoT development by presenting empirical studies of accountability in action.
Hand-based biometrics identifies users by unique features in their hands, such as fingerprints, palmprints, hand geometry, and finger and palm vein patterns. This book explores the range of technologies and methods under development and in use for hand-based biometrics, with evaluations of the advantages and performance of each.
This is a timely review of the fundamentals, the latest developments and the diverse applications of nature-inspired algorithms in cyber security and resiliency. Based on concepts from natural processes, phenomena and organisms, it presents novel methodologies to cope with cyber security challenges.
This edited book presents the state of the art in voice biometrics research and technologies including implementation and deployment challenges in terms of interoperability, scalability and performance, and security.
This book covers physical layer security (PHY) for wireless sensing and radio environment concepts along with the related security implications in terms of eavesdropping, disruption, manipulation and, in general, the exploitation of wireless sensing by unauthorised users.
This edited book covers advances, trends and future opportunities in the security framework of social media-computing. The authors focus on how to protect social media platforms, and present methods for making social media computing more reliable and effective to achieve trusted IoT-based social computing with Blockchain technology.
The book proposes solutions to revamp traditional security architecture by addressing critical security challenges in commercialized 5G and envisioned 6G wireless communication systems. New insights into real-world scenarios for the deployment, applications and management of robust, secure, and efficient security schemes are discussed.
This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including Machine and Deep Learning architectures, emerging applications and ethical and legal concerns.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.