Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

The Complete Book of Data Anonymization
  • Language: en
  • Pages: 271

The Complete Book of Data Anonymization

  • Type: Book
  • -
  • Published: 2013-05-21
  • -
  • Publisher: CRC Press

The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data anonymization. It examines data anonymization from both a practitioner's and a program sponsor's perspective. Discussing analysis, planning, setup, and governance, it illustrates the entire process of adapting an

SMACing the Bank
  • Language: en
  • Pages: 295

SMACing the Bank

  • Type: Book
  • -
  • Published: 2017-11-15
  • -
  • Publisher: CRC Press

The formula for the Future of Work is called SMAC - social, mobile, analytics and cloud on one integrated stack where each function enables another to maximize its effect. This is the new enterprise IT model delivering an organization that is more connective, collaborative, real time and productive. This book provides a comprehensive view of how SMAC Technologies are impacting the entire banking "eco-system" as well as the key stakeholders, namely customers, employees and partners.

Iris Biometric Model for Secured Network Access
  • Language: en
  • Pages: 214

Iris Biometric Model for Secured Network Access

  • Type: Book
  • -
  • Published: 2016-04-19
  • -
  • Publisher: CRC Press

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgen

The Frugal CISO
  • Language: en
  • Pages: 365

The Frugal CISO

  • Type: Book
  • -
  • Published: 2014-05-19
  • -
  • Publisher: CRC Press

If you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture describes techniques you can immediately put to u

Data Mining Mobile Devices
  • Language: en
  • Pages: 317

Data Mining Mobile Devices

  • Type: Book
  • -
  • Published: 2016-04-19
  • -
  • Publisher: CRC Press

With today's consumers spending more time on their mobiles than on their PCs, new methods of empirical stochastic modeling have emerged that can provide marketers with detailed information about the products, content, and services their customers desire.Data Mining Mobile Devices defines the collection of machine-sensed environmental data pertainin

The Practical Guide to HIPAA Privacy and Security Compliance
  • Language: en
  • Pages: 548

The Practical Guide to HIPAA Privacy and Security Compliance

  • Type: Book
  • -
  • Published: 2014-10-20
  • -
  • Publisher: CRC Press

Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and

Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing
  • Language: en
  • Pages: 795

Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing

This book includes selected papers presented at International Conference on Computational Intelligence, Data Science and Cloud Computing (IEM-ICDC) 2020, organized by the Department of Information Technology, Institute of Engineering & Management, Kolkata, India, during 25-27 September 2020. It presents substantial new research findings about AI and robotics, image processing and NLP, cloud computing and big data analytics as well as in cyber security, blockchain and IoT, and various allied fields. The book serves as a reference resource for researchers and practitioners in academia and industry.

Android Malware and Analysis
  • Language: en
  • Pages: 246

Android Malware and Analysis

  • Type: Book
  • -
  • Published: 2014-10-24
  • -
  • Publisher: CRC Press

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis. In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. The book covers both methods of malware analysis: dynamic and static. This tactical and practical book shows you how to use to use dynamic malware analysis to check the behavior o...

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks
  • Language: en
  • Pages: 338

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks

  • Type: Book
  • -
  • Published: 2016-04-19
  • -
  • Publisher: CRC Press

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to de

Conflict and Cooperation in Cyberspace
  • Language: en
  • Pages: 363

Conflict and Cooperation in Cyberspace

  • Type: Book
  • -
  • Published: 2016-04-19
  • -
  • Publisher: CRC Press

Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world. Maintaining a focus on policy-relevant solutions, i