|
![]() |
|||
|
||||
OverviewThe huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecurity and Privacy – bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject. Technical topics discussed in the book include: • Cybersecurity • Encryption • Privacy policy • Trust • Security and Internet of Things • Botnets • Data risks • Cloudbased Services • Visualization Full Product DetailsAuthor: Samant Khajuria , Lene Sørensen , Knud Erik SkoubyPublisher: River Publishers Imprint: River Publishers Dimensions: Width: 15.60cm , Height: 1.40cm , Length: 23.40cm Weight: 0.513kg ISBN: 9788793519664ISBN 10: 8793519664 Pages: 238 Publication Date: 15 May 2017 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsPreface; 1. Scene Setting; 2. An Introduction to Security Challenges in User-facing Cryptographic Software; 3. Take or Leave It : Effective Visualization of Privacy Policies; 4. Challenges of Cyber Security and a Fundamental Way to Address Cyber Security; 5. A Secure Channel Using Social Messaging for Distributed Low-Entropy Steganography; 6. Computational Trust; 7. Security in the Industrial Internet of Things; 8. Security in Internet of Things; 9. Modern and Resilient Cybersecurity - the need for principles, collaboration, innovation, education and the occasional application of power; 10. Building Secure Data Centres for Cloud Based Services - A Case Study; 11.Pervasive Governance - Understand and Secure Your Transaction Data and ContentReviewsAuthor InformationSamant Khajuria, Lene Sørensen, Knud Erik Skouby Tab Content 6Author Website:Countries AvailableAll regions |