Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness…
The Constitution of India provides that it shall be the duty of the Union to protect the states against internal disturbance and external aggression, and the states shall be responsible for maintaining police forces and securing public order. A large country, with nearly 23,000 km. of land and sea borders, India faces a host of internal, external and varied other serious security challenges. Th…
The issue of biofuels has already been much debated, but the focus to date has largely been on Latin America and deforestation - this highly original work breaks fresh ground in looking at the African perspective. Most African governments see biofuels as having the potential to increase agricultural productivity and export incomes and thus strengthen their national economies, improving energy b…
The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, i…
This book focuses on opportunities and challenges in implementing a bioeconomy strategy from a research and education perspective. It draws on contributions presented during the 30th EURAGRI annual conference held in Tartu (Estonia) in September 2016, as well as on other workshops organised as part of EURAGRI. EURAGRI is an informal gathering of EU research and higher education organisations an…
Panduan Praktis TPM 2.0: Menggunakan Modul Platform Terpercaya di Era Keamanan Baru adalah panduan dasar yang mudah dipahami untuk para pengembang. Buku ini menunjukkan konsep keamanan dan TPM, mendemonstrasikan penggunaannya dalam aplikasi nyata yang dapat dicoba oleh pembaca. Sederhananya, buku ini dirancang untuk memberdayakan dan menggairahkan komunitas pemrograman untuk keluar dan melakuka…
Although it was always an important issue, digital era increases the importance of both questions “what identity is” and “why is important to manage and protect one.” There are many views and definitions of digital identity in the literature; however, this chapter explains the identity related to the identification of an individual, his/her qualification, and his/her status in society
Although it was always an important issue, digital era increases the importance of both questions “what identity is” and “why is important to manage and protect one.” There are many views and definitions of digital identity in the literature; however, this chapter explains the identity related to the identification of an individual, his/her qualification, and his/her status in society…
This open access book addresses the protection of privacy and personality rights in public records, records management, historical sources, and archives; and historical and current access to them in a broad international comparative perspective. Considering the question “can archiving pose a security risk to the protection of sensitive data and human rights?”, it analyses data security and …
This book explores both the state of the art and the latest developments in QKD. It describes the fundamental concepts and practical aspects of QKD from a viewpoint of information security and quantum channel efficiency improvement. The purpose of this book is to extend and update the knowledge of the readers in the dynamically changing field of QKD. The authors attempt to present in detail the…