See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodolo ...
This book focuses on ambient intelligence and addresses various issues related to data management, networking and HCI in this context. Taking a holistic view, it covers various levels of abstraction, ranging from fundamental to advanced concepts and brings together the contributions of various specialists in the field. Moreover, the book covers the key areas of computer science concerned with the emergence of ambient intelligence (e.g. interacti ...
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now the most sought after skill in the digital forensics and incident response fields. Beginning ...
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exci ...
Digital technologies are reshaping every field of social and economic lives, so do they in the world of scientific knowledge. “The New Challenges of Knowledge” aims at understanding how the new digital technologies alter the production, diffusion and valorization of knowledge. We propose to give an insight into the economical, geopolitical and political stakes of numeric in knowledge in different countries. Law is at the center of this evolution ...
Cloud Computing: Business Trends and Technologies provides a broad introduction to Cloud computing technologies and their applications to IT and telecommunications businesses (i.e., the network function virtualization, NFV). To this end, the book is expected to serve as a textbook in a graduate course on Cloud computing. The book examines the business cases and then concentrates on the technologies necessary for supporting them. In the process, ...
MOOCs (Massive Online Open Courses) are shaking up the traditional forms of primary and continuing education and training. These new distance teaching tools which take advantage of the Web and social network revolution are making us think again about how we teach and learn. ...
The main aim of this book is to offer companies a simple and practical method to assess their maturity in the Governance Information System, so that they are in working order to face the challenges of Digital Transformation. How can companies effectively manage their investment in IT systems and make the most of their development? ...
Acclaimed by various content platforms (books, music, movies) and auction sites online, recommendation systems are key elements of digital strategies. If development was originally intended for the performance of information systems, the issues are now massively moved on logical optimization of the customer relationship, with the main objective to maximize potential sales. On the transdisciplinary approach, engines and recommender systems brings ...