↓ Skip to main content

Information Security

Overview of attention for book
Cover of 'Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Distributed Ledger Technology to Support Digital Evidence Integrity Verification Processes
  3. Altmetric Badge
    Chapter 2 Real-Time Face Antispoofing Using Shearlets
  4. Altmetric Badge
    Chapter 3 Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses
  5. Altmetric Badge
    Chapter 4 An Investigation into Students Responses to Various Phishing Emails and Other Phishing-Related Behaviours
  6. Altmetric Badge
    Chapter 5 Information Availability and Security in Foreign Corrupt Practices Act Investigations
  7. Altmetric Badge
    Chapter 6 A Certificate-Less Key Exchange Protocol for IoT
  8. Altmetric Badge
    Chapter 7 Detecting Manipulated Smartphone Data on Android and iOS Devices
  9. Altmetric Badge
    Chapter 8 An Evaluation of the Password Practices on Leading e-Commerce Websites in South Africa
  10. Altmetric Badge
    Chapter 10 Small and Medium-Sized Enterprises’ Understanding of Security Evaluation of Cloud-Based Business Intelligence Systems and Its Challenges
  11. Altmetric Badge
    Chapter 11 Preventing and Mitigating Ransomware
  12. Altmetric Badge
    Chapter 12 Mitigating the Ransomware Threat: A Protection Motivation Theory Approach
  13. Altmetric Badge
    Chapter 312 Shaping Microbiota During the First 1000 Days of Life
  14. Altmetric Badge
    Chapter 313 Necrotizing Enterocolitis and the Preterm Infant Microbiome
  15. Altmetric Badge
    Chapter 316 Targeting Food Allergy with Probiotics
  16. Altmetric Badge
    Chapter 324 Morphometric Analysis of the Lumbar Vertebrae Concerning the Optimal Screw Selection for Transpedicular Stabilization
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

2 blogs
14 tweeters
1 Facebook page
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Information Security
Published by
Springer International Publishing, January 2019
DOI 10.1007/978-3-030-11407-7
978-3-03-011406-0, 978-3-03-011407-7

Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff

Twitter Demographics

The data shown below were collected from the profiles of 14 tweeters who shared this research output. Click here to find out more about how the information was compiled.