Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Gestion des cookies
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
Los datos e información que personas, dispositivos e instituciones int ercambian a diario en la sociedad de la información crecen día a día d e forma ...Savoir plus
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-tec...Savoir plus
Using both a theoretical argumentation and an empirical investigation, this book rationalizes the view that in order to understand people's privacy pe...Savoir plus
Recent decades have seen a proliferation of cybersecurity guidance in the form of government regulations and standards with which organizations must c...Savoir plus
If you ever wondered how this app works, or how it is possible to send information from a machine to a computer... Well, it is all due to the programm...Savoir plus
Our contemporary age is confronted by a profound contradiction: on the one hand, our lives as workers, consumers and citizens have become ever more mo...Savoir plus
This book helps you to bring the information security of your organization to the right level by using the ISO/IEC 27001 standard. An organization oft...Savoir plus
This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Personal Analytics and Privacy, PAP 2...Savoir plus
This revision of the classic book on CCTV technology, CCTV Surveillance, provides a comprehensive examination of CCTV, covering the applications of va...Savoir plus
Technology and digitization are a great social good. But they also involve risks and threats. Cybersecurity is not just a matter of data or computer s...Savoir plus
Medical information refers to any data related to a patient's medical history, mental or physical condition, diagnoses or treatment. Processing refers...Savoir plus
This groundbreaking book filters down the wealth of information on cybersecurity to the most relevant and highly applicable aspects for coaches, thera...Savoir plus
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure...Savoir plus
Passage of the European Data Protection Directive and other national laws have increased the need for companies and other entities to improve their da...Savoir plus
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and th...Savoir plus
Let's be realistic here. Ordinary K-12 educators don't know what "cybersecurity" is and could probably care less about incorporating it into their les...Savoir plus
This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that arise between these importa...Savoir plus
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and comm...Savoir plus
This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presen...Savoir plus
In this fascinating and compelling book--a must-read for anyone who owns a computer--Misha Glenny exposes our governments' multi-billion-dollar war ag...Savoir plus
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security a...Savoir plus
From predictive policing to self-surveillance to private security, the potential uses to of big data in crime control pose serious legal and ethical c...Savoir plus
This book provides the first comprehensive doctrinal and comparative study to examine the influence of the fundamental human right to respect for priv...Savoir plus
The whirlwind of social media, online dating, and mobile apps can make life a dream--or a nightmare. For every trustworthy website, there are countles...Savoir plus