Part 1: Cybersecurity and Cyberdefense.- Chapter 1. Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks.- Chapter 2. Single Sign-On Implementation: Leveraging Browser Storage for Handling Tabbed Browsing Sign-outs.- Chapter 3. Cybernetic Dependency Capacity.- Chapter 4. Portuguese Concerns and Experience of Specific Cybercrimes: A Benchmarking with European Citizens.- Chapter 5. Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review.- Chapter 6. Is Cyber Warfare an Alternative?.- Chapter 7. Memory Auditing for Detection of Compromised Switches in Software Defined Networks Using Trusted Execution Environment.- Chapter 8. Mobile Communication Systems Evolution and Security.- Part 2: Computer Networks, Mobility and Pervasive Systems.- Chapter 9. Evaluating Trail Formation in Collaborative UAV Networks with Lethal Threats.- Chapter 10. Visual Analytics applied in the Reduction of Air Pollution on Real Time, Derived from WSN.
This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days
Share This Book: