|Total results: 58||
|Architectures and Protocols for Secure Information Technology Infrastructures
Antonio Ruiz-Martinez, Rafael Marin-Lopez, Fernando Pereniguez-Garcia.
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers.
Architectures and Protocols for Secure...
Network Security Technologies: Design and Applications
Abdelmalek Amine, Otmane Ait Mohamed, Boualem Benatallah.
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels.
Analyzing Security, Trust, and Crime in the Digital World
Hamid R. Nemati.
In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations.
Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in...
Advances in Secure Computing, Internet Services, and Applications
B.K. Tripathy, D. P. Acharjya.
Technological advancements have extracted a vast amount of useful knowledge and information for applications and services. These developments have evoked intelligent solutions that have been utilized in efforts to secure this data and avoid potential complex problems.
Advances in Secure Computing...
Information Security in Diverse Computing Environments
Anne Kayem, Christoph Meinel.
Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues.
Information Security in Diverse...
Privacy Solutions and Security Frameworks in Information Protection
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security...
Multimedia Information Hiding Technologies and Methodologies for Controlling Data
The widespread use of high-speed networks has made the global distribution of digital media contents readily available in an instant. As a result, data hiding was created in an attempt to control the distribution of these copies by verifying or tracking the media signals picked up from copyright...
Critical Information Infrastructure Protection and Resilience in the ICT Sector
Paul Théron, Sandro Bologna.
With the progression of technological breakthroughs creating dependencies on telecommunications, the internet, and social networks connecting our society, CIIP (Critical Information Infrastructure Protection) has gained significant focus in order to avoid cyber attacks, cyber hazards, and a general...
Advanced Security and Privacy for RFID Technologies
While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for RFID Technologies addresses these concerns with its comprehensive coverage on current issues with...
Theory and Practice of Cryptography Solutions for Secure Information Systems
Atilla Elçi, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, Rajan Shankaran.
Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious...
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks
Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the...
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
Junaid Ahmed Zubairi, Athar Mahboob.
Cyber security, encompassing both information and network security, is of utmost importance in today’s information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces...
International Journal of Risk and Contingency Management (IJRCM)
Kenneth David Strang.
The International Journal of Risk and Contingency Management (IJRCM) publishes interdisciplinary research papers, reviews, and case studies that examine risk, uncertainty, and contingency. The journal encourages risk and contingency research from disciplines like healthcare, manufacturing, natural...
Optimizing Information Security and Advancing Privacy Assurance: New Technologies
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and...
Situational Awareness in Computer Network Defense: Principles, Methods and Applications
Cyril Onwubiko, Thomas Owens.
Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security Information and Event Management (SIEM) to monitor...
Threats, Countermeasures, and Advances in Applied Information Security
Manish Gupta, John Walp, Raj Sharman.
Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow exponentially. Threats, Countermeasures, and Advances in Applied Information Security addresses the fact that managing information security program while...
Anonymous Security Systems and Applications: Requirements and Solutions
As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual’s purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers’ lives...
Digital Business Security Development: Management Technologies
Don Kerr, John G. Gammack, Kay Bryant.
Security is an increasingly important area of study for businesses as failure to address company protection can have severe ramifications for the long-term viability of any e-commerce enterprise. Digital Business Security Development: Management Technologies provides comprehensive coverage of issues...
Pervasive Information Security and Privacy Developments: Trends and Advancements
Privacy and security concerns are at the forefront of research and critical study in the prevalence of information technology. Pervasive Information Security and Privacy Developments: Trends and Advancements compiles research on topics such as technical, regulatory, organizational, managerial...