41-60
of
4,341
results
-
River Publishers Digital Secur...This book offers a comprehensive exploration of the profound challenges and op... This book offers a comprehensive exploration of the profound challenges and opportunities presented by deepfake technology across industries society and governance. It delves into the multifaceted impacts of synthetic media examining its potential... more
-
NATO Science for Peace and Sec...This book collects the latest research results on security-related advanced te... This book collects the latest research results on security-related advanced technologies. The chapters contain relevant and interesting topics from numerous research. Data science and artificial intelligence research nowadays one of the most... more
-
Advances in Information Securi...Impacts and Risk Assessment of Technology for Internet Security-Enabled Inform... Impacts and Risk Assessment of Technology for Internet Security-Enabled Information Small-Medium Enterprises details the key impacts and risk assessment within the context of technology-enabled information (TEI) which is engaged in the process of... more
-
Praeger Security International...A comprehensive textbook that overviews common technologies utilized within th... A comprehensive textbook that overviews common technologies utilized within the homeland security enterprise with an emphasis on contemporary homeland security mission areas and end-user applications. Designed for students entering or currently... more
-
Peer-to-Peer Storage: Security...Peer-to-peer (P2P) has proven as a most successful way to produce large scale ... Peer-to-peer (P2P) has proven as a most successful way to produce large scale reliable and cost-effective applications as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively... more
-
Pre-Owned Platform Embedded Se...Our books are pre-loved which means they have been read before. We carefully c... Our books are pre-loved which means they have been read before. We carefully check all our books and believe them to be in a - USED - VERY GOOD Condition condition. If you re not completely satisfied please get in touch & we ll be happy to help.... more
-
Pre-Owned Labor and Technology...An illuminating collection of candid interviews and photographs with workers i... An illuminating collection of candid interviews and photographs with workers in America s burgeoning security state. In a world increasingly under surveillance this cutting-edge documentary collaboration turns the camera on the ever-expanding... more
-
Pre-Owned Advanced Sciences an...1. What is community resilience? How does it apply to coping with uncertainty ... 1. What is community resilience? How does it apply to coping with uncertainty caused by disasters?.- 2. What do disaster-affected communities say about community resilience? How do specific communities think and apply community resilience?.- 3. What... more
-
Routledge Studies in Conflict ...This book examines the European governance of emerging security technologies. ... This book examines the European governance of emerging security technologies. The emergence of technologies such as drones autonomous robotics artificial intelligence cyber and biotechnologies has stimulated worldwide debates on their use risks and... more
-
Routledge Studies in Conflict ...This book examines the European governance of emerging security technologies. ... This book examines the European governance of emerging security technologies. The emergence of technologies such as drones autonomous robotics artificial intelligence cyber and biotechnologies has stimulated worldwide debates on their use risks and... more
-
Cloud Application Security Ess...Modern application development is deeply intertwined with cloud computing maki... Modern application development is deeply intertwined with cloud computing making robust application security an absolute imperative for every professional. As applications increasingly leverage cloud components and services like Azure understanding... more
-
Information Security Technolog...This book constitutes the refereed proceedings of the 16th International Confe... This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems NordSec 2011 held in Tallinn Estonia October 26-28 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed... more
-
Security Science and Technolog...Cyber-security is a matter of rapidly growing importance in industry and gover... Cyber-security is a matter of rapidly growing importance in industry and government. This book provides insight into a range of data science techniques for addressing these pressing concerns.The application of statistical and broader data science... more
-
Advances in Digital Technologi...The book serves two very important purposes. Firstly the concept of vulnerabil... The book serves two very important purposes. Firstly the concept of vulnerabilities due to cyberattacks in all walks of lives are explained along with how to detect and reduce the risk through digital forensics. Secondly the book describes how such... more
-
Advanced Sciences and Technolo...This book attempts to look into the genesis of security culture as a concept w... This book attempts to look into the genesis of security culture as a concept which emerged with the recognition of the role of the human factor in the context of security. It traces the rapid evolution of security culture into a multi-functional... more
-
Pre-Owned Homeland Security Te...A comprehensive textbook that overviews common technologies utilized within th... A comprehensive textbook that overviews common technologies utilized within the homeland security enterprise with an emphasis on contemporary homeland security mission areas and end-user applications. Designed for students entering or currently... more
-
Routledge Critical Security St...This book analyses how banks implement counter-terrorist financing measures an... This book analyses how banks implement counter-terrorist financing measures and experiment with technologies to assess risks and make security decisions. Banks have become private security actors. As gatekeepers of the financial system they are... more
-
Advances in Information Securi...This book offers the first comprehensive overview of contemporary systems for ... This book offers the first comprehensive overview of contemporary systems for secure electronic/digital postage. It provides a professional description of technologies used and analysis of security achieved by introducing a taxonomy of electronic... more
-
NATO Science for Peace and Sec...The NATO Advanced Study Institute on Sensors for Environment Health and Securi... The NATO Advanced Study Institute on Sensors for Environment Health and Security: Advanced Materials and Technology was held in Vichy (France) on September 16-27 2007 where more than 65 participants ranging from Ph. D. students to experienced senior... more
-
Nuclear Safeguards Security an...Nuclear Safeguards Security and Nonproliferation: Achieving Security with Tech... Nuclear Safeguards Security and Nonproliferation: Achieving Security with Technology and Policy Second Edition is a comprehensive reference covering the cutting-edge technologies used to trace track and safeguard nuclear material. Sections cover... more
Ads related to cloud security technologies services ibm