International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security ... in Intelligent Systems and Computing, 842)
The 2018 International Conference on Applications and Techniques in Cyber
Intelligence (ATCI), building on the previous successes in Ningbo, China (2017),
Guangzhou, China (2016), Dallas, USA (2015), Beijing, China (2014), and Sydney,
Australia (2013), is proud to be in the sixth consecutive conference year in
Shanghai.... Social Practices of Rule-Making in World Politics
Rule-based global order remains a central object of study in International Relations. Constructivists have identified a number of mechanisms by which actors accomplish both the continuous reproduction and transformation of the rules, institutions, and regimes that constitute their worlds. However, it is less clear how these mechanisms...
Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
Socially Responsible IT Management "A recommended read for all IT professionals and a must read for those in management."Tom Molnar, business systems analyst
"The combination of practicality, ease of implementation, and positive return on investment is what makes this book work so well. The easy-to-implement action steps makes dealing with these ten social...
Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...
Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...
Malware Detection (Advances in Information Security)
Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...
|Result Page: 22 21 20 19 18 17 16 15 14 13 |