The third edition of this trusted guide demonstrates the practical advantages of test-driven development (TDD) with Python and describes how to develop a real web application. Youll learn how to write and run tests before building each part of yo...Daugiau...
This book examines the complex interplay between state-of-the-art telecommunications, smart city initiatives, and the Internet of Things (IoT), analyzing the security challenges and opportunities that emerge as the world ventures into this technol...Daugiau...
(Išleidimo metai: 21-Oct-2025, Hardback, Leidėjas: Oxford University Press, ISBN-13: 9780198972587)
Protecting EU Consumers in Internet of Things Ecosystems examines the intersection of technology and law in the rapidly growing world of smart devices. Dr Koolen considers how EU consumer law, EU competition law, and EU data privacy law can...Daugiau...
This book highlights the intersection of quantum computing and blockchain technology, addressing the urgent need for enhanced security measures in a post-quantum world....Daugiau...
Internet of Things Security: Attacks, Tools, Techniques and Challenges delves into the essential aspects of safeguarding devices within the IoT ecosystem. This book provides a comprehensive overview of the IoT architecture, its vast applicatio...Daugiau...
George Dimitoglou, Leonidas Deligiannidis, Hamid R. Arabnia
Serija: Intelligent Computing
(Išleidimo metai: 20-Oct-2025, Hardback, Leidėjas: De Gruyter, ISBN-13: 9783111436418)
The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security. This book provides essential insights into the latest research and best practices and techniques for protecting against cyber thre...Daugiau...
Structured around strategic foundations, operational developments, and emerging threats, the book examines how Türkiye has adapted to the evolving landscape of terrorism....Daugiau...
Metaverse Platform Implementation: AI, Security, and Applications provides a comprehensive exploration of the engineering and scientific principles behind the metaverse, a 3D digital world designed to replicate and enhance physical reality...Daugiau...
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...Daugiau...
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...Daugiau...
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architecture...Daugiau...
Russia, China, Iran, Saudi Arabia, Turkey, North Korea and India are engaged in foreign information manipulation and interference (FIMI) in the democratic practices of countries in Europe, America, Africa and Asia. The Ukraine, in particular, has...Daugiau...
From the author of Tokyo Vice comes the wild, true story of cyber-era commerce, crime, cold-hard cash, and one of the greatest heists in history.Even in hell, Bitcoin talks. This modern take on an old Japanese sayi...Daugiau...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Daugiau...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Daugiau...
Agbotiname Lucky Imoize, Webert Montlouis, Segun I. Popoola, Mohammad Hammoudeh
Serija: River Publishers Series in Digital Security and Forensics
(Išleidimo metai: 14-Oct-2025, Hardback, Leidėjas: River Publishers, ISBN-13: 9788743801290)
This book provides a comprehensive analysis of security and privacy in cyber-physical systems, covering threat detection, cryptographic mechanisms, machine learning-based intrusion detection, and blockchain security....Daugiau...
Serija: River Publishers Rapids Series in Digital Security and Forensics
(Išleidimo metai: 14-Oct-2025, Hardback, Leidėjas: River Publishers, ISBN-13: 9788770041676)
This book explores Internet of Medical Things (IoMT) security and privacy in electronic healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks. It covers IoMT security challenges, potential attacks, and...Daugiau...
This book interrogates the legality of corporate surveillance, offering a corrective approach to protecting privacy through litigation--not through legislation.Explosive revelations, from the Snowden disclosures to the Cambridge Analytica s...Daugiau...
This book interrogates the legality of corporate surveillance, offering a corrective approach to protecting privacy through litigation--not through legislation. It will be of interest to researchers and practitioners in the field of corporate surv...Daugiau...
Fault tree analysis is key tool in risk analysis. It is a widely used industry standard with applications in amongst others, the aerospace, automotive, chemical and nuclear industries.Society depends on complex engineering systems such as (...Daugiau...