With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security
Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area.
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have bee
This book constitutes revised selected papers from the 10th International Conference on Web Information Systems and Technologies, WEBIST 2014, held in Barcelona
This book examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance through the de