PERHAPS A GIFT VOUCHER FOR MUM?: MOTHER'S DAY

Close Notification

Your cart does not contain any items

$147

Hardback

Not in-store but you can order this
How long will it take?

QTY:

English
River Publishers
31 March 2017
The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level.

Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies - all of these are tightly interwoven when it comes to security and privacy.

This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject. Technical topics discussed in the book include:
* Cybersecurity
* Encryption
* Privacy policy
* Trust
* Security and Internet of Things
* Botnets
* Data risks
* Cloudbased Services
* Visualization

Edited by:   , , , ,
Imprint:   River Publishers
Country of Publication:   Denmark
Dimensions:   Height: 234mm,  Width: 156mm,  Spine: 14mm
Weight:   513g
ISBN:   9788793519664
ISBN 10:   8793519664
Series:   River Publishers Series in Communications
Pages:   238
Publication Date:  
Audience:   College/higher education ,  Professional and scholarly ,  Further / Higher Education ,  Undergraduate
Format:   Hardback
Publisher's Status:   Active
Preface; 1. Scene Setting; 2. An Introduction to Security Challenges in User-facing Cryptographic Software; 3. Take or Leave It : Effective Visualization of Privacy Policies; 4. Challenges of Cyber Security and a Fundamental Way to Address Cyber Security; 5. A Secure Channel Using Social Messaging for Distributed Low-Entropy Steganography; 6. Computational Trust; 7. Security in the Industrial Internet of Things; 8. Security in Internet of Things; 9. Modern and Resilient Cybersecurity - the need for principles, collaboration, innovation, education and the occasional application of power; 10. Building Secure Data Centres for Cloud Based Services - A Case Study; 11.Pervasive Governance - Understand and Secure Your Transaction Data and Content

Samant Khajuria, Lene Sorensen, Knud Erik Skouby

See Also