Computer Security Literacy

Computer Security Literacy

Author: Douglas Jacobson

Publisher: CRC Press

Published: 2016-04-19

Total Pages: 370

ISBN-13: 1439856192

DOWNLOAD EBOOK

Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practica


Cyber Security: Analytics, Technology and Automation

Cyber Security: Analytics, Technology and Automation

Author: Martti Lehto

Publisher: Springer

Published: 2015-05-30

Total Pages: 268

ISBN-13: 3319183028

DOWNLOAD EBOOK

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.


Mobile Commerce: Concepts, Methodologies, Tools, and Applications

Mobile Commerce: Concepts, Methodologies, Tools, and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2017-06-19

Total Pages: 1584

ISBN-13: 1522526005

DOWNLOAD EBOOK

In the era of digital technology, business transactions and partnerships across borders have become easier than ever. As part of this shift in the corporate sphere, managers, executives, and strategists across industries must acclimate themselves with the challenges and opportunities for conducting business. Mobile Commerce: Concepts, Methodologies, Tools, and Applications provides a comprehensive source of advanced academic examinations on the latest innovations and technologies for businesses. Including innovative studies on marketing, mobile commerce security, and wireless handheld devices, this multi-volume book is an ideal source for researchers, scholars, business executives, professionals, and graduate-level students.


National Security Drivers of Ukraine

National Security Drivers of Ukraine

Author: Oleksandr Radchenko

Publisher: Springer Nature

Published: 2023-09-07

Total Pages: 315

ISBN-13: 3031337247

DOWNLOAD EBOOK

This volume presents the key informational, communication, and socio-political drivers of the Ukrainian state's national security. Since the beginning of the third millennium, there has been an aggravation of global inter-civilizational confrontations, which in 2022 has already resulted in an open military aggression against Ukraine. The hybrid wars against the world of democracy have put ensuring the national security of states on the front pages of world and national agendas. Using the example of Ukraine, the book demonstrates how, in order to achieve their geopolitical interests, authoritarian regimes incite information wars as a prerequisite for the transition to an armed "hot" war. It further shows how these processes actualize the formation of a fundamentally new state policy to ensure information and, more broadly, national security. The book identifies the main threats to national security in modern states and identifies ways of protecting Ukraine's national interests. The book will appeal to scholars, students, and researchers of political science, international relations, social sciences, and neighboring disciplines, as well as practitioners and policy-makers interested in a better understanding of national security drivers and protecting national interests.


Proceedings of International Ethical Hacking Conference 2018

Proceedings of International Ethical Hacking Conference 2018

Author: Mohuya Chakraborty

Publisher: Springer

Published: 2018-10-04

Total Pages: 502

ISBN-13: 9811315442

DOWNLOAD EBOOK

This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.


Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives

Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives

Author: Santanam, Raghu

Publisher: IGI Global

Published: 2010-12-31

Total Pages: 296

ISBN-13: 1609601254

DOWNLOAD EBOOK

Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector. Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics.


Network and System Security

Network and System Security

Author: Javier Lopez

Publisher: Springer

Published: 2013-05-27

Total Pages: 810

ISBN-13: 3642386318

DOWNLOAD EBOOK

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).