Hack Proofing Your E-Commerce Site was written in response to requests from readers of our first book, Hack Proofing Your Network: Internet Tradecraft. Many of you asked us for more detail on how to protect e-commerce sites, given the unique risk and exposure such...
This completely updated edition of the leading ethics and law guide for students, as well as practicing school psychologists, provides authoritative, timely information on professional standards and legal requirements pertinent to the delivery of school psychological services. Ethics and Law for School
Data mining has developed rapidly and has become very popular in the past two decades, but actually has
its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases.
The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In
corporate...
Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of personal privacy by merchants as well as hackers - is this what the World Wide Web is really all about?
Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks...
Digital communications technology has immeasurably enhanced our capacity to store, retrieve, and exchange information. But who controls our access to information, and who decides what others have a right to know about us? In Controlling Knowledge, author Lorna Stefanick offers a thought-provoking and eminently user-friendly overview of...
Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry.
This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature details on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference...
This is a practical and solutions-oriented text that presents HIPAA’s broad scope of guidelines in a clear and concise manner. It will provide confidence with your knowledge of the HIPAA Administrative Simplification legislation.
Does HIPAA affect you? HIPAA (Health Insurance Portability and Accountability Act) touches every aspect...
The Web is slowly but surely changing from a model in which a human reader browses content on web pages to a model in which services and clients (not necessarily humans) exchange information. And because of this, author Silvia Puglisi explains, it makes more sense to build platforms instead of just products or applications. Platforms...
This book provides an in-depth guide to security in wireless ad hoc and sensor networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management...
Data Protection and Compliance in Context is a comprehensive guide which: 1.explains the content of data protection laws; 2.provides practical advice on protecting data privacy under the Data Protection Act, human rights laws and freedom of information legislation; 3.gives data controllers a platform for building compliance strategies. Data...