Practical Vulnerability Management shows you how to weed out system security weaknesses...
Was bedeuten ›Virtuelle Realität‹, Industrie 4.0, ›Künstliche Intelligenz‹ und nicht zuletzt das ...
Public Key Infrastructures (PKI) are a trust management technology for public keys, consisting...
As a beginning graduate student, I recall being frustrated by a general lack of acces sible sourc...
IT securiteers - The human and technical dimension working for the organisation.Current...
Negli ultimi decenni il rapido sviluppo delle tecnologie IT ha influito in maniera determinante n...
Motivation for the Book This book seeks to establish the state of the art in the cyber situationa...
Wireless systems are becoming increasingly pervasive and securing these systems has been chall...
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of in...
The new computing environment enabled by advances in service oriented arc- tectures, mashups, and...
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Informat...
Privacy, Security and Trust within the Context of Pervasive Computing is an e...