You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted a...
The second volume of this edited collection offers a number of contributions from leading scholars investigating Blockchain and its implications for business. Focusing on the transformation of the overall value chain, the sections cover the foundations of Blockchain and its sustainability, social and legal applications. It features a variety of use cases, from tourism to healthcare. Using a number of theoretical and methodological approaches, this innovative publication aims to further the cause of this ground-breaking technology and its use within information technology, supply chain and wider business management research.
This report examines the portfolio of tools funded by the State Department’s Bureau of Democracy, Human Rights, and Labor that help support Internet freedom and assesses the impact of these tools in promoting U.S. interests (such as freedom of expression, freedom of the press, and the free flow of information) without enabling criminal activity.
Mobile computing and multimedia technologies continue to expand and change the way we interact with each other on a business and social level. With the increased use of mobile devices and the exchange of information over wireless networks, information systems are able to process and transmit multimedia data in various areas. Contemporary Challenges and Solutions for Mobile and Multimedia Technologies provides comprehensive knowledge on the growth and changes in the field of multimedia and mobile technologies. This reference source highlights the advancements in mobile technology that are beneficial for developers, researchers, and designers.
This book constitutes the proceedings of the Blockchain and RPA Forum, held as part of the 19th International Conference on Business Process Management, BPM 2021, which took place during September 6-10, 2021, in Rome, Italy. The Blockchain Forum and the RPA Forum have in common that they are centered around an emerging and exciting technology. The blockchain is a sophisticated distributed ledger technology, while RPA software allows for mimicking human, repetitive actions. Each of these have the potential to fundamentally change how business processes are being orchestrated and executed in practice. The 8 papers presented in this volume were carefully reviewed and selected from a total of 14 submissions.
This book constitutes the refereed proceedings of the 10th Software Quality Days Conference, SWQD 2018, held in Vienna, Austria, in January 2018. The Software Quality Days (SWQD) conference started in 2009 and has grown to the biggest conferences on software quality in Europe with a strong community. The program of the SWQD conference is designed to encompass a stimulating mixture of practical presentations and new research topics in scientific presentations. The guiding conference topic of the SWQD 2018 is “Software Quality 4.0: Methods and Tools for better Software and Systems”, as novel technologies include new challenges and might require new and adapted methods and tools to support quality assurance activities early. The 6 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 16 submissions. The volume also contains 2 invited talks. The contributions were organized in topical sections named: safety and security; requirements engineering and requirements-based testing; crowdsourcing in software engineering; software and systems architecture; experimentation in software engineering; and smart environments.
This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on channel attacks; connection security; human aspects of security and privacy; detecting malware and software weaknesses; system security; network security and privacy; access control and authentication; crypto currencies; privacy and security management; and machine learning and security.
This book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, held in Quy Nhon, Vietnam, in November 2020.* The 29 full papers and 8 short were carefully reviewed and selected from 161 submissions. The selected papers are organized into the following topical headings: big data analytics and distributed systems; security and privacy engineering; industry 4.0 and smart city: data analytics and security; data analytics and healthcare systems; machine learning-based big data processing; emerging data management systems and applications; and short papers: security and data engineering. * The conference was held virtually due to the COVID-19 pandemic.