Search

Your search keyword '"Data security"' showing total 744 results

Search Constraints

Start Over You searched for: Descriptor "Data security" Remove constraint Descriptor: "Data security" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
744 results on '"Data security"'

Search Results

3. Does AI Technology Adoption Affect Auditors’ Decision-Making Capabilities: Evidence from Jordan?

4. A Whispering Widgets and Wireless Wonders Pioneering Change in the World of IoT

7. Data Security Paradigms: Paillier Homomorphic Encryption and AES in the Context of Privacy-Preserving Computation

8. Mobile Phones

9. Hardware

11. Digital Twin Contribution in Integrated Processes of Fashion and Textile Supply Chains

12. Advancing Network Security: A Big Data Analytics Approach to Trust and Integrity

13. The Analysis and Integration of Diverse Data Sources for Decision-Making Process of Big Data

14. Development Towards a Cloud-Based Failover Architecture to Support Zambia Revenue Authority’s Domestic Tax Systems

15. Data Protection from A Global Perspective: Challenges and Strategies for Multinational Corporation Data Security Compliance

16. Ethics in Teleassessment

18. USB Fort Knox: Building a Robust Defense Against Data Breaches

20. Transforming Healthcare: The Synergistic Fusion of AI and IoT for Intelligent, Personalized Well-Being

21. Predictive Maintenance System and Method Based on Smart Edge Gateways

22. Security Perspectives in Integrity Verification for Shared Data in Cloud—A Survey

23. Usage of HR Analytics Tools Restoring Data Privacy in Data-Driven Organizations

24. Evaluating Port Emissions Prediction Model Resilience Against Cyberthreats

37. Connecting the Dots: Unveiling the Power of Sensors in IoT

41. Research on Data Security Protection of Power Grid Geographic Information

45. Endpoint Detection and Response System: Emerging Cyber Security Technology

46. An Efficient Provable Massive Data Migration Approach Under Secure Cloud Storage

47. Automatic Directory Service Integration in Distributed Firewall Resources: A Study of Scripting and LDAP Integration with pfSense

48. Using Game Theory to Secure Smart Contracts in Blockchain

49. Analysing e-Healthcare Data from Internet of Things Devices and Cloud Computing

50. Machine Learning and IoT in Health 4.0

Catalog

Books, media, physical & digital resources