Table of Contents
Preface
Chapter 1. Future Directions towards Effective Legal Regulation of Cloud Computing
(Rebecca Parry – Nottingham Law School, Nottingham Trent University, Nottingham, UK)
Chapter 2. The Current Mechanisms for Malware Detection and Response
(Ahmet Hasan Koltuksuz and Cagatay Yucel – Department of Computer Engineering, Yasar University, Izmir, Turkey, et al.)
Chapter 3. Phishing in a Pandemic: Hidden Danger of COVID-19
(Vida M. Vilić – Research Associate, Clinic of Dentistry Niš, Assistant Director for Legal Matters, Niš, Serbia)
Chapter 4. IT Disaster Recovery Planning: Establishing and Analyzing the Constructs
(Tejinder Pal Singh Brar, Ravi Kumar Sharma and Parul Gandhi – Professor and Head Department of Computer Applications – CBSA, handigarh Group of Colleges, Landran, Mohali, India, et al.)
Chapter 5. Resource and Power Management for In-Band D2D Communications
(You-Chiun Wang – Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan)
Chapter 6. Digitization Technology of Old Romanian Documents Printed in the Cyrillic Script
(A. Colesnicov, L. Malahov, S. Cojocaru and L. Burtseva – V. Andrunachievici Institute of Mathematics and Computer Science, Chisinau, Republic of Moldova)
Index