Architectures and Protocols for Secure Information Technology Infrastructures

Architectures and Protocols for Secure Information Technology Infrastructures
Author: Ruiz-Martinez, Antonio
Publsiher: IGI Global
Total Pages: 427
Release: 2013-09-30
Genre: Computers
ISBN: 9781466645158

Download Architectures and Protocols for Secure Information Technology Infrastructures Book in PDF, Epub and Kindle

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.

Contemporary Identity and Access Management Architectures Emerging Research and Opportunities

Contemporary Identity and Access Management Architectures  Emerging Research and Opportunities
Author: Ng, Alex Chi Keung
Publsiher: IGI Global
Total Pages: 241
Release: 2018-01-26
Genre: Computers
ISBN: 9781522548294

Download Contemporary Identity and Access Management Architectures Emerging Research and Opportunities Book in PDF, Epub and Kindle

Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area. Businesses are facing new demands in implementing solutions, however, there is a lack of information and direction. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities is a critical scholarly resource that explores management of an organization’s identities, credentials, and attributes which assures the identity of a user in an extensible manner set for identity and access administration. Featuring coverage on a broad range of topics, such as biometric application programming interfaces, telecommunication security, and role-based access control, this book is geared towards academicians, practitioners, and researchers seeking current research on identity and access management.

Network Security Technologies Design and Applications

Network Security Technologies  Design and Applications
Author: Amine, Abdelmalek
Publsiher: IGI Global
Total Pages: 348
Release: 2013-11-30
Genre: Computers
ISBN: 9781466647909

Download Network Security Technologies Design and Applications Book in PDF, Epub and Kindle

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.

Digital Transformation Evaluating Emerging Technologies

Digital Transformation  Evaluating Emerging Technologies
Author: Tugrul U Daim
Publsiher: World Scientific
Total Pages: 590
Release: 2020-07-28
Genre: Computers
ISBN: 9789811214646

Download Digital Transformation Evaluating Emerging Technologies Book in PDF, Epub and Kindle

Selecting the right technology is one of the most critical decisions in technology driven enterprises, and no selection is complete without a thorough and informed evaluation. This book explores the digital transformation movement from three perspectives: the technological, the personal, and the organizational.The technical perspective analyses and evaluates new and up and coming technologies such as IoT and Cloud Technology. The personal perspective focuses on the consumer's attitude and experience in the adoption of technologies such as smart homes, smart watches, drones and wireless devices. And the organizational perspective focuses on evaluating how technology-driven an organization and their core activities or products are.This book is an ideal reference for managers who are responsible for digital transformation in their organizations and also serves a good starting point for researchers interested in understanding the trend. The book contains case studies that may be used by educators in MBA and Engineering and Technology Management MS programs covering digital transformation related courses.

Analyzing Security Trust and Crime in the Digital World

Analyzing Security  Trust  and Crime in the Digital World
Author: Nemati, Hamid R.
Publsiher: IGI Global
Total Pages: 299
Release: 2013-12-31
Genre: Computers
ISBN: 9781466648579

Download Analyzing Security Trust and Crime in the Digital World Book in PDF, Epub and Kindle

In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.

Web Information Systems and Technologies

Web Information Systems and Technologies
Author: Valérie Monfort,Karl-Heinz Krempels
Publsiher: Springer
Total Pages: 380
Release: 2015-12-15
Genre: Computers
ISBN: 9783319270302

Download Web Information Systems and Technologies Book in PDF, Epub and Kindle

This book constitutes revised selected papers from the 10th International Conference on Web Information Systems and Technologies, WEBIST 2014, held in Barcelona, Spain, April 2014, organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), and technically sponsored by the European Research Center for Information Systems (ERCIS). The purpose of the WEBIST series of conferences is to bring together researches, engineers and practitioners interested in technological advances and business applications of web-based information systems. The 21 papers presented in this volume were carefully reviewed and selected originally 153 paper submissions. They were organized in topical sections names, internet technology; web interfaces and applications; society, e-business and e-government; web intelligence; and mobile information systems. The book also contains two invited talks in full-paper length.

Driving Efficiency in Local Government Using a Collaborative Enterprise Architecture Framework Emerging Research and Opportunities

Driving Efficiency in Local Government Using a Collaborative Enterprise Architecture Framework  Emerging Research and Opportunities
Author: Tiwary, Amit
Publsiher: IGI Global
Total Pages: 150
Release: 2017-05-17
Genre: Law
ISBN: 9781522524083

Download Driving Efficiency in Local Government Using a Collaborative Enterprise Architecture Framework Emerging Research and Opportunities Book in PDF, Epub and Kindle

The overall functions of a government impact a wide range of sectors in society. It is imperative for governments to work at full capacity and potential in order to ensure quality progress for its citizens. Driving Efficiency in Local Government Using a Collaborative Enterprise Architecture Framework: Emerging Research and Opportunities is an essential scholarly publication for the latest research on methods for smart government initiatives and implementations, and addresses prevalent internal and external security risks. Featuring extensive coverage on a broad range of topics such as technology funds, mobile technology, and cloud computing, this book is ideally designed for professionals, academicians, researchers, and students seeking current research on the ways in which governments can advance and prosper.

New Threats and Countermeasures in Digital Crime and Cyber Terrorism

New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Author: Dawson, Maurice
Publsiher: IGI Global
Total Pages: 369
Release: 2015-04-30
Genre: Computers
ISBN: 9781466683464

Download New Threats and Countermeasures in Digital Crime and Cyber Terrorism Book in PDF, Epub and Kindle

Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.