Part 1: Cybersecurity and Cyberdefense.- Chapter 1. Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks.- Chapter 2. Single Sign-On Implementation: Leveraging Browser Storage for Handling Tabbed Browsing Sign-outs.- Chapter 3. Cybernetic Dependency Capacity.- Chapter 4. Portuguese Concerns and Experience of Specific Cybercrimes: A Benchmarking with European Citizens.- Chapter 5. Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review.- Chapter 6. Is Cyber Warfare an Alternative?.- Chapter 7. Memory Auditing for Detection of Compromised Switches in Software Defined Networks Using Trusted Execution Environment.- Chapter 8. Mobile Communication Systems Evolution and Security.- Part 2: Computer Networks, Mobility and Pervasive Systems.- Chapter 9. Evaluating Trail Formation in Collaborative UAV Networks with Lethal Threats.- Chapter 10. Visual Analytics applied in the Reduction of Air Pollution on Real Time, Derived from WSN.
ThriftBooks sells millions of used books at the lowest
everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We
deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15.
ThriftBooks.com. Read more. Spend less.