Communications category: 4698 books

Cover of Security and Privacy Preserving in Social Networks
by
Language: English
Release Date: October 17, 2013

This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and approaches...
Cover of E-discovery: Creating and Managing an Enterprisewide Program

E-discovery: Creating and Managing an Enterprisewide Program

A Technical Guide to Digital Investigation and Litigation Support

by Karen A. Schuler
Language: English
Release Date: April 18, 2011

One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI). According to the 2007 Socha-Gelbmann Electronic Discovery Survey, it is now a $2...
Cover of Threat 2.0

Threat 2.0

Security and Compliance for Web 2.0 Sites

by Alan Calder
Language: English
Release Date: January 15, 2009

This pocket guide will provide you with an invaluable introduction to the security and compliance issues surrounding Web 2.0 technologies. It includes a programme of best-practice steps you can take to manage the risks involved with Web 2.0, together with advice on how to ensure your organisation stays on the right side of the relevant privacy and data protection requirements.
Cover of Advances in Cryptology – ASIACRYPT 2016

Advances in Cryptology – ASIACRYPT 2016

22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I

by
Language: English
Release Date: November 14, 2016

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks...
Cover of A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act
by Sven Elmers
Language: English
Release Date: October 31, 2011

Bachelor Thesis from the year 2009 in the subject Computer Science - IT-Security, grade: 2,1, New College Durham, language: English, abstract: The researcher chose the title 'A critical analysis of Google's behaviour towards its users in relation to the European Data Protection Act and the United...
Cover of Hacking Web Intelligence

Hacking Web Intelligence

Open Source Intelligence and Web Reconnaissance Concepts and Techniques

by Sudhanshu Chauhan, Nutan Kumar Panda
Language: English
Release Date: April 13, 2015

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is, reconnaissance—is not given enough...
Cover of The Internet and Email For The Over 50s: Teach Yourself Ebook Epub
by Bob Reeves
Language: English
Release Date: March 26, 2010

Do you feel that you have been left behind in the technological revolution? Are you looking for sound, practical advice on getting the most out of email and the Internet? If so, The Internet and email for the Over 50s is exactly what you need! Focusing on a wide range of internet and email uses that...
Cover of Risks and Security of Internet and Systems

Risks and Security of Internet and Systems

10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers

by
Language: English
Release Date: April 2, 2016

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Risks and Security of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island, Greece, in July 2015. The 18 full papers presented were selected from 50 submissions. The papers...
Cover of Information Systems Security

Information Systems Security

12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings

by
Language: English
Release Date: November 24, 2016

This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected...
Cover of Cryptographic Hardware and Embedded Systems – CHES 2016

Cryptographic Hardware and Embedded Systems – CHES 2016

18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings

by
Language: English
Release Date: August 3, 2016

This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized...
Cover of Public-Key Cryptography – PKC 2017

Public-Key Cryptography – PKC 2017

20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I

by
Language: English
Release Date: February 24, 2017

The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected...
Cover of Information Security Applications

Information Security Applications

16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers

by
Language: English
Release Date: March 23, 2016

This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume were carefully reviewed and selected from...
Cover of Research in Attacks, Intrusions, and Defenses

Research in Attacks, Intrusions, and Defenses

20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings

by
Language: English
Release Date: October 10, 2017

This book constitutes the refereed conference proceedings of the 20th  International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2017, held in Atlanta, GA, USA, in September 2017. The 21 revised full papers were selected from 105 submissions. They are organized in the...
Cover of Trusted Systems

Trusted Systems

6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers

by
Language: English
Release Date: January 29, 2016

Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial...
First 89 90 91 92 93 94 9596 97 98 99 100
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy