Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it beco
A comprehensive guide to advanced sensor networking technologies, this handbook provides in-depth coverage of sensor networking theory, technology, and practice as it relates to established technologi
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With mo
Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an extern
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becom
A book/CD-ROM package for nonprogrammers desiring to create virtual reality environments and 3D graphics on the Internet. Coverage includes OpenGL Graphics Standards and VRML standards, with discussio
A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases a
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they rela
It is forecasted that cellular systems using digital technology will become the universal method of telecommunications. This book describes and explains the rapid advances in Global System for Mobil
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists’ online presence is utilized for terrorism funding, communic
This comprehensive handbook serves as a professional reference and practitioner’s guide to today’s most complete and concise view of private cloud security. It explores practical solutions to a wide r
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and pre