|
|
Showing 1 - 5 of
5 matches in All Departments
Developing nations have seen many technological advances in the
last decade. Although beneficial and progressive, they can lead to
unsafe mobile devices, system networks, and internet of things
(IoT) devices, causing security vulnerabilities that can have
ripple effects throughout society. While researchers attempt to
find solutions, improper implementation and negative uses of
technology continue to create new security threats to users.
Cybersecurity Capabilities in Developing Nations and Its Impact on
Global Security brings together research-based chapters and case
studies on systems security techniques and current methods to
identify and overcome technological vulnerabilities, emphasizing
security issues in developing nations. Focusing on topics such as
data privacy and security issues, this book is an essential
reference source for researchers, university academics, computing
professionals, and upper-level students in developing countries
interested in the techniques, laws, and training initiatives
currently being implemented and adapted for secure computing.
Technological advances, although beneficial and progressive, can
lead to vulnerabilities in system networks and security. While
researchers attempt to find solutions, negative uses of technology
continue to create new security threats to users. New Threats and
Countermeasures in Digital Crime and Cyber Terrorism brings
together research-based chapters and case studies on security
techniques and current methods being used to identify and overcome
technological vulnerabilities with an emphasis on security issues
in mobile computing and online activities. This book is an
essential reference source for researchers, university academics,
computing professionals, and upper-level students interested in the
techniques, laws, and training initiatives currently being
implemented and adapted for secure computing.
The Internet of Things describes a world in which smart
technologies enable objects with a network to communicate with each
other and interface with humans effortlessly. This connected world
of convenience and technology does not come without its drawbacks,
as interconnectivity implies hackability. Security Solutions for
Hyperconnectivity and the Internet of Things offers insights from
cutting-edge research about the strategies and techniques that can
be implemented to protect against cyber-attacks. Calling for
revolutionary protection strategies to reassess security, this book
is an essential resource for programmers, engineers, business
professionals, researchers, and advanced students in relevant
fields.
In the modern world, natural disasters are becoming more
commonplace, unmanned systems are becoming the norm, and terrorism
and espionage are increasingly taking place online. All of these
threats have made it necessary for governments and organizations to
steel themselves against these threats in innovative ways.
Developing Next-Generation Countermeasures for Homeland Security
Threat Prevention provides relevant theoretical frameworks and
empirical research outlining potential threats while exploring
their appropriate countermeasures. This relevant publication takes
a broad perspective, from network security, surveillance,
reconnaissance, and physical security, all topics are considered
with equal weight. Ideal for policy makers, IT professionals,
engineers, NGO operators, and graduate students, this book provides
an in-depth look into the threats facing modern society and the
methods to avoid them.
Developing nations have seen many technological advances in the
last decade. Although beneficial and progressive, they can lead to
unsafe mobile devices, system networks, and internet of things
(IoT) devices, causing security vulnerabilities that can have
ripple effects throughout society. While researchers attempt to
find solutions, improper implementation and negative uses of
technology continue to create new security threats to users.
Cybersecurity Capabilities in Developing Nations and Its Impact on
Global Security brings together research-based chapters and case
studies on systems security techniques and current methods to
identify and overcome technological vulnerabilities, emphasizing
security issues in developing nations. Focusing on topics such as
data privacy and security issues, this book is an essential
reference source for researchers, university academics, computing
professionals, and upper-level students in developing countries
interested in the techniques, laws, and training initiatives
currently being implemented and adapted for secure computing.
|
You may like...
Beta Thalassemia
Marwa Zakaria, Tamer Hassan
Hardcover
R3,076
Discovery Miles 30 760
Thee, Hannah!
Marguerite De Angeli
Paperback
R450
R420
Discovery Miles 4 200
|