The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the...
Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.
Overview
Learn how mobile devices are monitored and the impact of cloud computing
Who knows what cool things you could be doing right now with Windows XP? You do! So let’s go—it’s time to have some fun and amaze yourself with all you can do with your PC! This friendly, fast-paced guide highlights dozens of activities and experiences—and shares the straightforward how-to’s for trying everything...
Stop today's most vicious Internet attackers—right in their tracks!
Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...
Continued advances in information technologies are enabling a growing number of physical devices to be imbued with computingand communications capabilities. Aircraft, cars, household appliances, cellular telephones, and health monitoring devices all contain microprocessors that are being linked with other information processing devices. Such...
This book’s emphasis is on describing a complete architectural framework, which combines theory and practice in a way that gives a realistic view of the opportunities and challenges in the applications and services area, including results from both extensive user evaluations and technical evaluations. It will cover topics in the B3G area that...
This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface...
MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...
In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a
critical organizational and national research agenda inviting interest from a multidisciplinary
scientific workforce. There are many avenues into this area, and, in recent
research, machine-learning and data-mining techniques have been applied to design,...
SECURITY AND PRIVACY issues with computers and computer networks
are constantly in the news these days, and everyone seems to be concerned
about them to some degree. Businesses everywhere are worried about
having
sensitive customer information such as credit card numbers or email
addresses
stolen,...
Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud. Directors must respond to increasingly complex and competing...