 |
|
 The Cambridge Handbook of Information and Computer Ethics
Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary... |  |  Scene of the Cybercrime: Computer Forensics Handbook
"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and... |  |  Moodle Security
Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys... |
|
|
 Machine Learning for Email: Spam Filtering and Priority Inbox
To explain the perspective from which this book was written, it will be helpful to define
the terms machine learning and hackers.
What is machine learning? At the highest level of abstraction, we can think of machine
learning as a set of tools and methods that attempt to infer patterns and extract ... |  |  Real-Time Embedded Systems: Optimization, Synthesis, and Networking
Embedded systems are electronic systems that include a microprocessor to
perform certain specific tasks. The microprocessor is embedded or hidden inside
these products. Embedded systems are ubiquitous. Every week millions
of tiny chips come out of factories like Freescale, Microchip, Philips, Texas
Instruments, and Mitsubishi,... |  |  Computer Security Fundamentals (2nd Edition)
It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.
The real question is who is this book for. This book is... |
|
 Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and... |  |  Hands-On Ethical Hacking and Network Defense
It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who... |  |  Corporate Computer Security (3rd Edition)
The IT security industry has seen dramatic changes in the past decades. Security
breaches, data theft, cyber attacks, and information warfare are now common news
stories in the mainstream media. IT security expertise that was traditionally the
domain of a few experts in large organizations has now become a concern for almost... |
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 |