Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Data Privacy Management and Autonomous Spontaneous Security
  • Language: en
  • Pages: 407

Data Privacy Management and Autonomous Spontaneous Security

  • Type: Book
  • -
  • Published: 2014-03-20
  • -
  • Publisher: Springer

This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013). The volume contains 13 full papers selected out of 46 submissions and 1 keynote lecturer from the DPM workshop and 6 full papers together with 5 short papers selected among numerous submissions to the SETOP workshop. The papers cover topics related to the management of privacy-sensitive information and automated configuration of security, focusing in particular on system-level privacy policies, administration of sensitive identifiers, data integration and privacy, engineering authentication and authorization, mobile security and vulnerabilities.

Handbook of Research on Enterprise 2.0: Technological, Social, and Organizational Dimensions
  • Language: en
  • Pages: 799

Handbook of Research on Enterprise 2.0: Technological, Social, and Organizational Dimensions

  • Type: Book
  • -
  • Published: 2013-07-31
  • -
  • Publisher: IGI Global

Workplace technology is evolving at an accelerated pace, driving innovation, productivity, and efficiency to exceedingly high levels. Businesses both small and large must keep up with these changes in order to compete effectively with fellow enterprises. The Handbook of Research on Enterprise 2.0: Technological, Social, and Organizational Dimensions collects the most recent developments in evaluating the technological, organizational, and social dimensions of modern business practices in order to better foster advances in information exchange and collaboration among networks of partners and customers. This crucial reference supports managers and business professionals, as well as members of academia, IT specialists, and network developers in enhancing business practices and obtaining competitive advantage.

Information Communication Technology Law, Protection and Access Rights: Global Approaches and Issues
  • Language: en
  • Pages: 592

Information Communication Technology Law, Protection and Access Rights: Global Approaches and Issues

  • Type: Book
  • -
  • Published: 2010-06-30
  • -
  • Publisher: IGI Global

"This book identifies key issues in the relationship between ICT and law, ethics, politics and social policy, drawing attention to diverse global approaches to the challenges posed by ICT to access rights"--Provided by publisher.

Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications
  • Language: en
  • Pages: 2215

Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications

  • Type: Book
  • -
  • Published: 2018-10-05
  • -
  • Publisher: IGI Global

The censorship and surveillance of individuals, societies, and countries have been a long-debated ethical and moral issue. In consequence, it is vital to explore this controversial topic from all angles. Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications is a vital reference source on the social, moral, religious, and political aspects of censorship and surveillance. It also explores the techniques of technologically supported censorship and surveillance. Highlighting a range of topics such as political censorship, propaganda, and information privacy, this multi-volume book is geared towards government officials, leaders, professionals, policymakers, media specialists, academicians, and researchers interested in the various facets of censorship and surveillance.

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
  • Language: en
  • Pages: 638

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance

  • Type: Book
  • -
  • Published: 2014-07-31
  • -
  • Publisher: IGI Global

In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. The Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere. Bridging research and practical application, this comprehensive reference source is ideally designed for use by investigators, computer forensics practitioners, and experts in ICT law, as well as academicians in the fields of information security and criminal science.

Encyclopedia of Information Science and Technology, Third Edition
  • Language: en
  • Pages: 7972

Encyclopedia of Information Science and Technology, Third Edition

  • Type: Book
  • -
  • Published: 2014-07-31
  • -
  • Publisher: IGI Global

"This 10-volume compilation of authoritative, research-based articles contributed by thousands of researchers and experts from all over the world emphasized modern issues and the presentation of potential opportunities, prospective solutions, and future directions in the field of information science and technology"--Provided by publisher.

Integrated Information and Computing Systems for Natural, Spatial, and Social Sciences
  • Language: en
  • Pages: 543

Integrated Information and Computing Systems for Natural, Spatial, and Social Sciences

  • Type: Book
  • -
  • Published: 2012-10-31
  • -
  • Publisher: IGI Global

The 21st century has seen a number of advancements in technology, including the use of high performance computing. Computing resources are being used by the science and economy fields for data processing, simulation, and modeling. These innovations aid in the support of production, logistics, and mobility processes. Integrated Information and Computing Systems for Natural, Spatial, and Social Sciences covers a carefully selected spectrum of the most up to date issues, revealing the benefits, dynamism, potential, and challenges of information and computing system application scenarios and components from a wide spectrum of prominent disciplines. This comprehensive collection offers important guidance on the development stage of the universal solution to information and computing systems for researchers as well as industry decision makers and developers.

Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications
  • Language: en
  • Pages: 1875

Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications

  • Categories: Law
  • Type: Book
  • -
  • Published: 2019-06-07
  • -
  • Publisher: IGI Global

The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemedicine, and more. As more individuals and businesses use this essential tool to connect with each other and consumers, more private data is exposed to criminals ready to exploit it for their gain. Thus, it is essential to continue discussions involving policies that regulate and monitor these activities, and anticipate new laws that should be implemented in order to protect users. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications examines current internet and data protection laws and their impact on user experience and cybercrime, and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats. Highlighting a range of topics such as online privacy and security, hacking, and online threat protection, this multi-volume book is ideally designed for IT specialists, administrators, policymakers, researchers, academicians, and upper-level students.

Enabling Context-Aware Web Services
  • Language: en
  • Pages: 558

Enabling Context-Aware Web Services

  • Type: Book
  • -
  • Published: 2010-05-06
  • -
  • Publisher: CRC Press

With recent advances in radio-frequency identification (RFID) technology, sensor networks, and enhanced Web services, the original World Wide Web is continuing its evolution into what is being called the Web of Things and Services. Such a Web will support an ultimately interactive environment where everyday physical objects such as buildings, sidew

Towards a Knowledge-Aware AI
  • Language: en
  • Pages: 236

Towards a Knowledge-Aware AI

  • Type: Book
  • -
  • Published: 2022-09-29
  • -
  • Publisher: IOS Press

Semantic systems lie at the heart of modern computing, interlinking with areas as diverse as AI, data science, knowledge discovery and management, big data analytics, e-commerce, enterprise search, technical documentation, document management, business intelligence, enterprise vocabulary management, machine learning, logic programming, content engineering, social computing, and the Semantic Web. This book presents the proceedings of SEMANTiCS 2022, the 18th International Conference on Semantic Systems, held as a hybrid event – live in Vienna, Austria and online – from 12 to 15 September 2022. The SEMANTiCS conference is an annual meeting place for the professionals and researchers who ma...