PrefaceChapter 1 Future Directions Towards Effective Legal Regulation of Cloud ComputingChapter 2 The Current Mechanısms for Malware Detectıon and ResponseChapter 3 Phishing in a Pandemic: Hidden Danger of COVID-19Chapter 4 IT Disaster Recovery Planning: Establishing and Analyzing the ConstructsChapter 5 Resource and Power Management for In-Band D2D CommunicationsChapter 6 Digitization Technology of Old Romanian Documents Printed in the Cyrillic ScriptContents of Earlier VolumesIndex