" "



:






.. 1 2 3 4 5 6 7 8 9 10 ... 51


: Cybersecurity Law
: Jeff Kosseff
: Wiley
: 2017
ISBN : 978-1-119-23150-9
: 528
: PDF
: 6,4 M
: English

Expanding on the authors experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information safeguarding, law enforcement surveillance, cybercriminal combat, privacy, and many other cybersecurity issues. Written in an accessible manner, the book provides real-world examples and case studies to help readers understand the practical applications of the presented material. The book begins by outlining the legal requirements for data security, which synthesizes the Federal Trade Commissions cybersecurity cases in order to provide the background of the FTCs views on data security. The book also examines data security requirements imposed by a growing number of state legislatures and private litigation arising from data breaches. Anti-hacking laws, such as the federal Computer Fraud and Abuse Act, Economic Espionage Act, and the Digital Millennium Copyright Act, and how companies are able to fight cybercriminals while ensuring compliance with the U.S. Constitution and statutes are discussed thoroughly.
: vitvikvas , 12:10 | : 0 |

: Oracle Business Intelligence and Essbase Solutions Guide
: Rosendo Abellera, Lakshman Bulusu
: CRC Press
: 2016
ISBN : 9781482234077
: 210
: PDF
: 6,3 M
: English

Details the practical aspects of Oracle Essbase and Oracle BI as one BI solutionfrom both technological and solution perspectives
Presents implementation and customization methodologies
Focuses on architecture and design, as well as live implementation aspects of best-fit solutions
Covers analytical BI and data integration using Essbase
Considers operational BIpresentation and real-time reportingusing OBIEE
: vitvikvas , 11:27 | : 0 |
: Malware Diffusion Models for Modern Complex Networks
: Vasileios Karyotis and M.H.R. Khouzani
: Morgan Kaufmann
: 2016
: PDF
: 8,8
: / English

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks.
: black , 09:33 | : 0 |

:
: ..
: -
: 2002
: PDF
: 284
: 56,53
:

, , , , .
- (CTI) . , CTI, . (), , , . , .
: hunter12 , 05:52 | : 0 |

: Real-World Electronic Voting: Design, Analysis and Deployment
: Feng Hao, Peter Y. A. Ryan
: CRC Press
: 2016
ISBN : 9781498714693
: 478
: PDF
: 32 M
: English

Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting.
This book explores recent innovations in both poll-site and remote voting systems and their application throughout the world. The requirements of elections are analysed, the available tools and technologies are described, and a variety of modern systems are presented in detail together with discussions of deployments. This is an invaluable resource for election professionals, researchers and policy makers alike.
: vitvikvas , 22:33 | : 0 |
: Spinning the Semantic Web
: Dieter Fensel and James A. Hendler
: The MIT Press
: 2003
: PDF
: 15,6
: / English

As the World Wide Web continues to expand, it becomes increasingly difficult for users to obtain information efficiently. Because most search engines read format languages such as HTML or SGML, search results reflect formatting tags more than actual page content, which is expressed in natural language. Spinning the Semantic Web describes an exciting new type of hierarchy and standardization that will replace the current "web of links" with a "web of meaning." Using a flexible set of languages and tools, the Semantic Web will make all available information -- display elements, metadata, services, images, and especially content accessible.
: black 18-02-2017, 21:50 | : 0 |

: Learn WordPress: From beginner to advanced user
: Elias Ericson
: Elias Ericson
: 2017
: 152
: PDF
: 5,5 M
: English

WordPress is today's standard for quickly making a website. An incredibly useful tool to know.
The book gives a good introduction to WordPress and takes you into its powerful usage. A great overview of how WordPress is functioning. From its simple interface to utilizing WordPress' main strength of "Themes" and "Plugins" that are used for building and customizing websites.
With this book you will be able to make websites with WordPress. Making websites for companies, products, blogs with ease, presentations, online stores, portfolios, etc. This book goes through all parts of WordPress and takes you from a beginner to an advanced user of WordPress.
: vitvikvas 15-02-2017, 21:28 | : 0 |
: Active and Assisted Living: Technologies and Applications
: Francisco Florez-Revuelta and Alexandros Andre Chaaraoui
: The Institution of Engineering and Technology
: 2016
: PDF
: 51,7
: / English

This is a broad introductory handbook, for academic and industry researchers, covering the major technologies and applications in Ambient Assisted Living (AAL). Set out in three main sections: Part 1 focuses on current state-of-the-art technology and critical analysis: Part 2 covers the applications of these technologies; and Part 3 includes general issues such as usability, accessibility, privacy and ethics.
: black 14-02-2017, 09:16 | : 0 |
: Managing the Internet of Things: Architectures, Theories and Applications
: Jun Huang and Kun Hua
: The Institution of Engineering and Technology
: 2016
: PDF
: 13,4
: / English

The Internet of Things (IoT) refers to the evolution of the internet as the interconnection not just of computers, but also uniquely identifiable, pervasive embedded devices, for example, smart thermostats and wearable technology. Research has estimated there will be nearly 30 billion devices on the Internet of Things within the next decade. The implementation and deployment of the IoT brings with it management challenges around seamless integration, heterogeneity, scalability, mobility, security, and many other issues. This book explores these challenges and possible solutions.
: black 14-02-2017, 08:42 | : 0 |
: Engineering Secure Internet of Things Systems
: Benjamin Aziz and Alvaro Arenas
: The Institution of Engineering and Technology
: 2016
: PDF
: 12,7
: / English

The Internet of Things (IoT) is the emerging global interconnection of billions of "smart" devices. It is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability. This important book examines these important security considerations for the IoT, covering topics including federated identity management in IoT systems; security policies and access control; formal models and foundations of the IoT; verification and analysis of security properties in the IoT; secure IoT architectures, protocols and platforms; model driven security engineering of IoT systems; security-driven analytics of big IoT generated datasets; security patterns and standards for the IoT; and privacy and anonymity in IoT systems.
: black 14-02-2017, 08:37 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 51

 MirKnig.Su  2017