The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, i…
This book focuses on opportunities and challenges in implementing a bioeconomy strategy from a research and education perspective. It draws on contributions presented during the 30th EURAGRI annual conference held in Tartu (Estonia) in September 2016, as well as on other workshops organised as part of EURAGRI. EURAGRI is an informal gathering of EU research and higher education organisations an…
Panduan Praktis TPM 2.0: Menggunakan Modul Platform Terpercaya di Era Keamanan Baru adalah panduan dasar yang mudah dipahami untuk para pengembang. Buku ini menunjukkan konsep keamanan dan TPM, mendemonstrasikan penggunaannya dalam aplikasi nyata yang dapat dicoba oleh pembaca. Sederhananya, buku ini dirancang untuk memberdayakan dan menggairahkan komunitas pemrograman untuk keluar dan melakuka…
Although it was always an important issue, digital era increases the importance of both questions “what identity is” and “why is important to manage and protect one.” There are many views and definitions of digital identity in the literature; however, this chapter explains the identity related to the identification of an individual, his/her qualification, and his/her status in society
Although it was always an important issue, digital era increases the importance of both questions “what identity is” and “why is important to manage and protect one.” There are many views and definitions of digital identity in the literature; however, this chapter explains the identity related to the identification of an individual, his/her qualification, and his/her status in society…
This open access book addresses the protection of privacy and personality rights in public records, records management, historical sources, and archives; and historical and current access to them in a broad international comparative perspective. Considering the question “can archiving pose a security risk to the protection of sensitive data and human rights?”, it analyses data security and …
This book explores both the state of the art and the latest developments in QKD. It describes the fundamental concepts and practical aspects of QKD from a viewpoint of information security and quantum channel efficiency improvement. The purpose of this book is to extend and update the knowledge of the readers in the dynamically changing field of QKD. The authors attempt to present in detail the…
Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing and providing sophisticated cloud computing systems to their users in a cost-effective manner
This open access volume explores Ukraine's challenges post-war, focusing on economic revival and sustainable development. Addressing scholars, policymakers, and practitioners the book discusses pivotal issues for the rebuilding of Ukraine, such as institutional changes, economic hurdles, social stability, and environmental rejuvenation. The book highlights the inevitable need for Ukraine's i…
This open access book focuses on the geopolitical competition in the South China Sea, an area with highly concentrated choke points in the Indo-Pacific, presenting ideas and recommendations to manage this competition and foster cooperation to maintain a peaceful and stable environment and promote sustainable governance of the South China Sea and of the Indo-Pacific in a broader sense. The inc…