Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This proceedings volume presents a selection of peer-reviewed contributions from the Second Non-Associative Algebras and Related Topics (NAART II) conference, which was held at the University of Coimbra, Portugal, from July 18¿22, 2022. The conference was held in honor of mathematician Alberto Elduque, who has made significant contributions to the study of non-associative structures such as Lie, Jordan, and Leibniz algebras. The papers in this volume are organized into four parts: Lie algebras, superalgebras, and groups; Leibniz algebras; associative and Jordan algebras; and other non-associative structures. They cover a variety of topics, including classification problems, special maps (automorphisms, derivations, etc.), constructions that relate different structures, and representation theory.One of the unique features of NAART is that it is open to all topics related to non-associative algebras, including octonion algebras, composite algebras, Banach algebras, connections with geometry, applications in coding theory, combinatorial problems, and more. This diversity allows researchers from a range of fields to find the conference subjects interesting and discover connections with their own areas, even if they are not traditionally considered non-associative algebraists. Since its inception in 2011, NAART has been committed to fostering cross-disciplinary connections in the study of non-associative structures.
Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.Purchase of the print or Kindle book includes a free PDF eBookKey Features:- A beginners' guide to Keycloak focussed on understanding Identity and Access Management- Implement authentication and authorization in applications using Keycloak 22- Utilize Keycloak in securing applications developed by you and the existing applications in your enterpriseBook Description:The second edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates.In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter while using Keycloak 22. As you progress, you'll understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications.By the end of this new edition, you'll have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the latest features.What You Will Learn:- Understand how to install, configure, and manage the latest version of Keycloak- Discover how to obtain access tokens through OAuth 2.0- Utilize a reverse proxy to secure an application implemented in any programming language or framework- Safely manage Keycloak in a production environment- Secure different types of applications, including web, mobile, and native applications- Discover the frameworks and third-party libraries that can expand KeycloakWho this book is for:This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security. Basic knowledge of app development, authentication, and authorization is expected.Table of Contents- Getting Started with Keycloak- Securing Your First Application- Brief Introduction to Standards- Authenticating Users with OIDC- Authorizing Access with OAuth 2.0- Securing Different Application Types- Integrating Applications with Keycloak- Authorization Strategies- Configuring Keycloak for Production- Managing Users- Authenticating Users- Managing Tokens and Sessions- Extending Keycloak- Securing Keycloak and Applications
Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based on ISO/IEC 27001/27002:2022 standardsPurchase of the print or Kindle book includes a free PDF eBookKey Features:Familiarize yourself with the clauses and control references of ISO/IEC 27001:2022Define and implement an information security management system aligned with ISO/IEC 27001/27002:2022Conduct management system audits to evaluate their effectiveness and adherence to ISO/IEC 27001/27002:2022Book Description:ISO 27001 and ISO 27002 are globally recognized standards for information security management systems (ISMSs), providing a robust framework for information protection that can be adapted to all organization types and sizes. Organizations with significant exposure to information-security-related risks are increasingly choosing to implement an ISMS that complies with ISO 27001. This book will help you understand the process of getting your organization's information security management system certified by an accredited certification body.The book begins by introducing you to the standards, and then takes you through different principles and terminologies. Once you completely understand these standards, you'll explore their execution, wherein you find out how to implement these standards in different sizes of organizations. The chapters also include case studies to enable you to understand how you can implement the standards in your organization. Finally, you'll get to grips with the auditing process, planning, techniques, and reporting and learn to audit for ISO 27001.By the end of this book, you'll have gained a clear understanding of ISO 27001/27002 and be ready to successfully implement and audit for these standards.What You Will Learn:Develop a strong understanding of the core principles underlying information securityGain insights into the interpretation of control requirements in the ISO 27001/27002:2022 standardUnderstand the various components of ISMS with practical examples and case studiesExplore risk management strategies and techniquesDevelop an audit plan that outlines the scope, objectives, and schedule of the auditExplore real-world case studies that illustrate successful implementation approachesWho this book is for:This book is for information security professionals, including information security managers, consultants, auditors, officers, risk specialists, business owners, and individuals responsible for implementing, auditing, and administering information security management systems. Basic knowledge of organization-level information security management, such as risk assessment, security controls, and auditing, will help you grasp the topics in this book easily.
This book constitutes the proceedings of the 17th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2023, held in Kent, United Kingdom, in July 2023. The 37 full papers presented in this volume were carefully reviewed and selected from 54 submissions. They are organized in the following topical sections: education and training; management, policy and skills; evolving threats and attacks; social-technical factors; and research methods.
Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commonly understood. Ever since the major London banks purchased their first computers in the early 1960s, they have had to balance their dependence on those machines with the need to secure their operations and retain the trust of their customers.Technological change in the second half of the 20th century prompted British banks to reevaluate their function as trusted protectors of wealth. In the City of London, the capital's oldest area and historically its business and commerce hub, the colossal clearing banks employed newly commercialised electronic computers-the processing power of which could transform the highly clerical clearing and settlement process. What unfolded over the following three decades was a relentless modernisation drive. Revolutionising the way that banks and other financial institutions conducted business and interacted with each other and permanently altering the speed and scale at which the United Kingdom's financial sector functioned, this rapid modernisation thrust computer security into the consciousness of bank executives and their clients alike.Dependence on computers quickly grew, and the banks immediately realised the need to secure their new software and hardware. Focusing on the period 1960 to 1990, this book uses newly released and previously unexplored archival material to trace the origins of cyber security in the UK financial sector.Topics and features: Describes how institutions managed the evolving challenge of computer security in the second half of the 20th century Demonstrates continuity in banks' views of security through the prism of confidentiality, integrity and availability, and the concept of resilience Presents case studies of bank collaboration on computer security through creation of payment systems like SWIFT and CHAPS Outlines the shift from focusing on physical security measures to technical network-protection measures Explores the relationship between banks and the UK Government as bank operations became dependent on computer and network technology This work will be of value to students and academic researchers in the history of computing, financial history, and the history of intelligence and security, as well as the general reader interested in contemporary intelligence, cyber security, and finance.
Cryptosystem Algorithms A Comprehensive Evaluation presents an in-depth investigation into various cryptosystem algorithms. Through rigorous analysis and evaluation, the study delves into the working principles, strengths, weaknesses, and applications of these cryptographic algorithms.Researchers explore a wide range of algorithms commonly used in modern cryptosystems, including symmetric key algorithms like AES (Advanced Encryption Standard) and DES (Data Encryption Standard), as well as asymmetric key algorithms such as RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). The paper provides a detailed comparison of these algorithms in terms of their computational efficiency, security levels, and suitability for different use cases.Furthermore, the study examines the underlying mathematical concepts and cryptographic techniques that form the foundation of these algorithms. It analyzes how each algorithm addresses the critical aspects of data confidentiality, integrity, and authentication, making it invaluable for understanding their real-world implications in securing sensitive information and communications.The findings of this comprehensive study have far-reaching implications for cybersecurity and data protection. As cyber threats continue to evolve, understanding the intricacies of cryptosystem algorithms becomes increasingly crucial for safeguarding digital assets and ensuring secure communication across various sectors, including finance, healthcare, and government.Academics, researchers, and professionals in the fields of computer science, cybersecurity, and cryptography will find this research paper to be an essential resource, providing valuable insights and facilitating advancements in the ever-evolving domain of cryptographic algorithms and data security.
Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators.Because most of the functionality of a CPS is implemented in software, the software is of crucial importance for the safety and security of the CPS. This book presents principle-based engineering for the development and operation of dependable software.The knowledge in this book addresses organizations that want to strengthen their methodologies to build safe and secure software for mission-critical cyber-physical systems.The book:* Presents a successful strategy for the management of vulnerabilities, threats, and failures in mission-critical cyber-physical systems;* Offers deep practical insight into principle-based software development (62 principles are introduced and cataloged into five categories: Business & organization, general principles, safety, security, and risk management principles);* Provides direct guidance on architecting and operating dependable cyber-physical systems for software managers and architects.
This book tackles the problem of complexity within IT environments, i.e., "e;Cybercomplexity,"e; which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a probabilistic approach to security risk management. It then proposes a simple model of cybercomplexity that is based on Shannon entropy, a basic concept in information theory. The key drivers of cybercomplexity emerge from this model, where these drivers reveal the scale-dependence of cybersecurity risk and explain why macroscopic security controls are required to address cybersecurity risk on an enterprise scale. The significant operational implications of cybercomplexity are also discussed, thereby providing both a theoretical framework and a practical guide to addressing this longstanding problem in cybersecurity risk management.
This book constitutes revised selected papers from the workshops that were affiliated with the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. FC 2022 presents the following four workshops:CoDecFin 2022: 3rd Workshop on Coordination of Decentralized FinanceDeFi 2022: 2nd Workshop on Decentralized FinanceVoting 2022: 7th Workshop on Advances in Secure Electronic VotingWTSC 2022: 6th Workshop on Trusted Smart Contracts
The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment.The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.
Understand how your organisation can implement Cyber Essentials and Cyber Essentials Plus with this guide!
The Power of Personal Data: How it Shapes the Future of Business and SocietyIn today's digital age, personal data has become a valuable commodity, fueling the growth of many businesses and shaping the society we live in. The widespread use of the Internet and mobile devices has given rise to new business models that cater to our every need and convenience online. As a result, there is a race for data supremacy through the collection and exploitation of personal data, which feeds artificial intelligence (AI) tools and solutions such as ChatGPT, BingAI, and others.Here are a few highlights of what you will learn: Companies collect and analyze personal data to market to consumers based on their searches, behavioral habits, and purchasing patterns.Some of these companies provide habit-changing services that can result in irreversible social change.Personal data has become a currency that people are willing to trade for convenience, entertainment, and instant gratification.The book delves into the potential impact of personal data on the future of business and society.It explores the new surveillance capitalism business model, privacy concerns, the impact of social media, and how the future is shaping up given AI, Metaverse, and other online data-hungry solutions and applications.It also offers practical steps (Digital Gold Nuggets) that individuals can take to reclaim and reposition their data power.Some readers may be skeptical about the impact of personal data on society and may question the practicality of the suggested steps to reclaim data power.By understanding the power of personal data, readers can take control of their digital footprint and make informed decisions about their online activities.This book is a must-read for anyone concerned about the future of privacy and the impact of personal data on society.Get your copy of the book today to discover the power of personal data and take control of your digital life.
An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before. This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come. Readers will also find: Over 450 problems with accompanying solutions to reinforce key concepts and test retention Detailed discussion of topics including symmetric and asymmetric algorithms, random number generation, user authentication, and many more Over 200 figures and tables that provide rich detail to the content Cryptography: Algorithms, Protocols, and Standards for Computer Security is ideal for undergraduate and graduate students in cryptography and information technology subjects, as well as for researchers looking for a working reference on existing cryptographic algorithms and protocols.
This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022.The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.
"Jäger der Digitalen Schatten: OSINT und Personenrecherche im Internet" ist ein praxisnaher Einblick in das Handwerk der digitalen Informationsbeschaffung. Geschrieben von einer Top-Führungskraft und Berater mit umfangreicher Expertise in internen Untersuchungen und globalen Compliance-Verfahren bei renommierten DAX-Konzernen, beleuchtet dieses Buch die facettenreiche Welt der OSINT-Methodik (Open Source Intelligence).Weit mehr als ein Leitfaden, enthüllt dieses Werk die Feinheiten effizienter Datensammlung, -zusammenstellung und -analyse, und befähigt die Leser dazu, relevante Informationen aus der überwältigenden Flut an Online-Daten zu extrahieren und nach Relevanz zu bewerten. Der Autor teilt seine wertvollen praktischen Erfahrungen und bietet eine Vielzahl von Praxistipps, ergänzt durch eine ausführliche Darstellung nützlicher Tools aus dem Internet und dem Darkweb - Tools, die viele lieber im Verborgenen halten würden."Jäger der Digitalen Schatten" ist nicht nur eines der wenigen deutschsprachigen Praxisbücher über OSINT, es ist ein Leitfaden erprobter Methoden und Insiderwissen. Es ist unentbehrlich für Ermittler, Staatsanwälte, interne Untersucher und Journalisten, bietet aber gleichzeitig fesselnde Einblicke für jeden, der ein Interesse an der Welt der digitalen Informationssammlung hat. Dieses Buch bietet Ihnen eine völlig neue Perspektive auf die Möglichkeiten und Herausforderungen des Internets.
This volume LNCS 13942 constitutes the refereed proceedings of the 37th Annual IFIP WG 11.3 Conference, DBSec 2023, in Sophia-Antipolis, France, July 19¿21, 2023. The 19 full papers presented together with 5 short papers were carefully reviewed and selected from 56 submissions. The conference focuses on secure data sharing; access control and vulnerability assessment; machine learning; and mobile applications.
Une bible pratique pour le responsable informatiqueÉcrit par un responsable de la sécurité des systèmes d'information devenu DSI et par des experts des réseaux, des systèmes, de l'audit de sécurité et de la cryptologie, ce livre limpide expose les risques inhérents à tout système informatique - et les moyens de s'en protéger. S'adressant aux administrateurs et responsables informatiques comme à leurs interlocuteurs, il offre au professionnel consciencieux un exposé clair des modes opératoires des programmes nocifs et des outils censés les contrer ainsi qu'une méthode rigoureuse pour concevoir une véritable politique de sécurité.Une édition mise à jour avec les dernières avancées de la techniqueOutre un modèle de politique de sécurité et de charte d'utilisation que le lecteur pourra adaptera son environnement, cette cinquième édition, mise à jour avec les dernières évolutions en matière de menaces et de sécurité, fait le point sur les aspects spécifiques du cloud computing et d'IPv6, et propose un éclairage sur la dimension géostratégique de la sécurité liée à Internet (WikiLeaks, Stuxnet, révélations d'Edward Snowden, etc.). Les dernières avancées de la cryptographie post-quantique et du chiffrement homomorphe sont exposées de façon accessible au non-spécialiste.À qui s'adresse cet ouvrage ?Aux administrateurs de systèmes et de réseaux, mais aussi aux DSI et aux responsables de projets.À tous ceux qui doivent concevoir ou simplement comprendre une politique de sécurité informatique.Sur le site www.editions-eyrolles.comTéléchargez le code source des exemples.Consultez les mises à jour et compléments.
Do you know if you were hacked? Do you know if some personal information was stolen from your system or account? Have you always wanted to learn how to protect your system from such attacks? If you answered yes to all these questions, you've come to the right place.Unlike malicious hacking, ethical hacking is a legal way to test the vulnerabilities of a system. Many organizations are still wary of ethical hackers, and they have every right to be since some hackers lie for their own benefit. That being said, many organizations are now searching for ethical hackers because they want to identify a way to protect themselves and their customers and employees.Over the course of the book, you will learn more about what ethical hacking is and will begin to comprehend the different types of attacks that an ethical hacker can perform on a system. This book will talk about:¿ What ethical hacking is and how it is different from malicious hacking¿ Why it's important to hack a system¿ What the different phases of ethical hacking are¿ The steps that an ethical hacker must take to protect himself¿ The different skills an ethical hacker must have¿ The different tools that a hacker can utilize to test a system¿ Different types of attacks that can be performed on a system¿ How the hacker should protect a system from such attacksThis book provides numerous examples of different attacks and also includes some exercises that you can follow when you're performing these attacks for the first time. It is important to remember that ethical hacking is becoming one of the most sought-after professions because every organization is looking for a way to protect their data.
This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g. Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT). In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference.
This book includes extended and revised versions of selected papers from the 7th and 8th edition of the International Conference on Information Systems Security and Privacy (ICISSP 2021 and ICISSP 2022). ICISSP 2021 and 2022 was held as an online event due to the Covid-19 pandemic, from February 11¿13, 2021 and February 9¿11, 2022. respectively.The 6 full papers included in this book were carefully reviewed and selected from 217 submissions. The ICISSP 2021 and 2022 book contains extended and revised version of proceedings papers dealing with information systems security and privacy.
Go on a journey through the threat detection engineering lifecycle while enriching your skill set and protecting your organizationKey Features:- Gain a comprehensive understanding of threat validation- Leverage open-source tools to test security detections- Harness open-source content to supplement detection and testingBook Description:Threat validation is an indispensable component of every security detection program, ensuring a healthy detection pipeline. This comprehensive detection engineering guide will serve as an introduction for those who are new to detection validation, providing valuable guidelines to swiftly bring you up to speed.The book will show you how to apply the supplied frameworks to assess, test, and validate your detection program. It covers the entire life cycle of a detection, from creation to validation, with the help of real-world examples. Featuring hands-on tutorials and projects, this guide will enable you to confidently validate the detections in your security program. This book serves as your guide to building a career in detection engineering, highlighting the essential skills and knowledge vital for detection engineers in today's landscape.By the end of this book, you'll have developed the skills necessary to test your security detection program and strengthen your organization's security measures.What You Will Learn:- Understand the detection engineering process- Build a detection engineering test lab- Learn how to maintain detections as code- Understand how threat intelligence can be used to drive detection development- Prove the effectiveness of detection capabilities to business leadership- Learn how to limit attackers' ability to inflict damage by detecting any malicious activity earlyWho this book is for:This book is for security analysts and engineers seeking to improve their organization's security posture by mastering the detection engineering lifecycle.To get started with this book, you'll need a basic understanding of cybersecurity concepts, along with some experience with detection and alert capabilities.Table of Contents- Fundamentals of Detection Engineering- The Detection Engineering Life Cycle- Building a Detection Engineering Test Lab- Detection Data Sources- Investigating Detection Requirements- Developing Detections Using Indicators of Compromise- Developing Detections Using Behavioral Indicators- Documentation and Detection Pipelines- Detection Validation- Leveraging Threat Intelligence- Performance Management- Career Guidance for Detection Engineers
This book covers cybersecurity, privacy and control methods and technologies integrated with blockchain and multimedia AI, including encryption and watermarking techniques, wearable-based IoT security methods, multimedia data forensics and video monitoring.
This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including Machine and Deep Learning architectures, emerging applications and ethical and legal concerns.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVIII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: This book is the eighteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of eleven edited papers from the Eighteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, a fully-virtual event held in the winter of 2022.
This book significantly contributes the digital transformation of construction. The book explores the capabilities of deep learning to provide smart solutions for the construction industry, particularly in areas of managing equipment, design optimization, energy optimization and detect cracks for buildings and highways. It provides conceptual solutions but also practical techniques. A new deep learning CNN-based highway cracks detection is demonstrated, and its usefulness is tested. The resulting deep learning CNN model will enable users to scan long distance of highway and detect types of cracks accurately in a very short time compared to traditional approaches.The book explores the integration of IoT and blockchain to provide practical solutions to tackle existing challenges like the endemic fragmentation in supply chain, the need for monitoring construction projects remotely and tracking equipment on the site. The Blockchain of Things (BCoT) concept has been introduced to exploit the advantages of IoT and blockchain, and different applications were developed based on this integration in leading industries such as shared economy and health care. Workable potential use cases to exploit successful utilization of BCoT for the construction industry are explored in the book's chapters.This book will appeal to researchers in providing a comprehensive review of related literature on blockchain, the IoT and construction identify gaps and offer a springboard for future research. Construction practitioners, research and development institutes and policy makers will also benefit from its usefulness as a reference book and collection of case studies on the application of these new approaches in construction.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.