Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many...

Peak Learning
Peak Learning
Tens of thousands of readers have become lifelong learners with the help of Ronald Gross's bestselling guidebook. Now, Gross uses the latest developments in technology, at-home learning, and cognitive studies to provide an updated and easy-to-follow program that will take lifetime learners into the next century. In this new...
Psychological Aspects of Cyberspace: Theory, Research, Applications
Psychological Aspects of Cyberspace: Theory, Research, Applications

Hundreds of millions of people across the world use the Internet every day. Its functions vary, from shopping and banking to chatting and dating. From a psychological perspective, the Internet has become a major vehicle for interpersonal communication that can significantly affect people's decisions, behaviors, attitudes and emotions....

Information Foraging Theory: Adaptive Interaction with Information (Oxford Series in Human-Technology Interaction)
Information Foraging Theory: Adaptive Interaction with Information (Oxford Series in Human-Technology Interaction)
Although much of the hubris and hyperbole surrounding the 1990's Internet has softened to a reasonable level, the inexorable momentum of information growth continues unabated. This wealth of information provides resources for adapting to the problems posed by our increasingly complex world, but the simple availability of more information does not...
Firewalls for Dummies, Second Edition
Firewalls for Dummies, Second Edition
Guard your DSL and protect your personal information

Keep your network safe from viruses, saboteurs, eavesdroppers, and other bad guys

We don’t want to scare you, but "they" are out there! Don’t venture into lawless cyberspace without this trusty guide. It’ll help you evaluate the danger, understand how...

Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,...

Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
The marriage of computers and telecommunications, the integration of these technologies into a multimedia system of communication that has global reach, and the fact that they are available worldwide at low cost seems to be bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may...
Global Geographies of the Internet (SpringerBriefs in Geography)
Global Geographies of the Internet (SpringerBriefs in Geography)

Today, roughly 2 billion people use the internet, and its applications have flourished in number and importance. This volume will examine the growth and geography of the internet from a political economy perspective. Its central motivation is to illustrate that cyberspace does not exist in some aspatial void, but is deeply rooted in national...

Computer Network Security and Cyber Ethics, 4th ed.
Computer Network Security and Cyber Ethics, 4th ed.

In its 4th edition, this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves and our society. This new edition aims to integrate security education and awareness with discussions...

How the Internet Works (8th Edition)
How the Internet Works (8th Edition)
Have you ever wanted to know how data travels from computer to computer, around the world? Have you ever wondered how Web sites can track users or how newsgroups work? How the Internet Works shows you how with easy-to-follow, four-color visual spreads tracking the path data flows and the hardware involved. Now entering its fourth year, How the...
Tech Terms, Third Edition: What Every Telecommunications and Digital Media Professional Should Know
Tech Terms, Third Edition: What Every Telecommunications and Digital Media Professional Should Know
The purpose of this book is to provide telecommunications and digital media professionals with a collection of must-know terms and concepts that are likely to pop up in their daily conversations or appear in news articles or informational media that address our increasingly technological world. It is also intended for anyone who simply wants to...
unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy