On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 7th Symposium on Recent Advances in Intrusion Detection (RAID 2004), which took place in Sophia-Antipolis, French Riviera, France, September 15-17, 2004.
Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara.
Kaum eine Organisation kommt heutzutage ohne die Verarbeitung großer Mengen personenbezogener Daten in Informationssystemen aus, so dass sie sich konsequenterweise mit der Umsetzung datenschutzrechtlicher Anforderungen befassen müssen.
Kaum eine Organisation kommt heutzutage ohne die Verarbeitung großer Mengen personenbezogener Daten in Informationssystemen aus, so dass sie sich konsequenterweise mit der Umsetzung datenschutzrechtlicher Anforderungen befassen müssen.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn's 80th birthday.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication.
In today's fast-paced cybersecurity landscape, professionals are increasingly challenged by the vast volumes of cyber threat data, making it difficult to identify and mitigate threats effectively.
In today's fast-paced cybersecurity landscape, professionals are increasingly challenged by the vast volumes of cyber threat data, making it difficult to identify and mitigate threats effectively.
Cilium is now considered the de facto cloud native networking platform for Kubernetes, connecting, securing, and monitoring millions of applications across thousands of clusters.
Cilium is now considered the de facto cloud native networking platform for Kubernetes, connecting, securing, and monitoring millions of applications across thousands of clusters.
This book constitutes the refereed proceedings of the 19th International Conference on Network and System Security, NSS 2025, held in Wuhan, China, during December 5–7, 2025.
This book constitutes the refereed proceedings of the 19th International Conference on Network and System Security, NSS 2025, held in Wuhan, China, during December 5–7, 2025.
This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 1–2, 2025.
This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 1–2, 2025.
This book comprehensively examines the communication challenges posted by regulating large-scale flexible loads These challenges include high access demands, explosive data volume, frequent data transmission, realistic performance-based impact analysis, and security concerns.
This book constitutes the proceedings of the 15th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2025, held in Guwahati, India, during December 16–19, 2025.
This book constitutes the proceedings of the 15th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2025, held in Guwahati, India, during December 16–19, 2025.
This book constitutes the revised selected papers of the 21st European Workshop on Computer Performance Engineering, EPEW 2025, held in Catania, Italy, on June 26, 2025.
This book constitutes the revised selected papers of the 21st European Workshop on Computer Performance Engineering, EPEW 2025, held in Catania, Italy, on June 26, 2025.
Build a modern security intelligence program with Sumo Logic that combines DevSecOps practices, Cloud SIEM insights, and automation to detect, investigate, and respond faster while ensuring complianceFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesMaster essential skills for security monitoring and analytics using Sumo LogicPerform advanced threat hunting using Cloud SIEM in Sumo LogicGet up to speed quickly and easily with this practical guide for security analystsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionModernize your security operations with Sumo Logic s Continuous Intelligence Platform that delivers real-time detection, analysis, and response to threats, and find out how it enables security teams to unify monitoring, apply advanced analytics, and strengthen defenses across diverse environments.