This book is intended to give researchers and practitioners in the cross-cutting fields of artificial intelligence, machine learning (AI/ML) and cyber security up-to-date and in-depth knowledge of recent techniques for improving the vulnerabilities of AI/ML systems against attacks from malicious adversaries.
This book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021, held in Be'er Sheva, Israel, in July 2021.
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well.
This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication.
This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense.
The success of the Internet of Things and rich cloud services have helped create the need for edge computing, in which data processing occurs in part at the network edge, rather than completely in the cloud.
This book is a compilation of selected papers from the Seventh Symposium on Digital Instrumentation and Control Technology for Nuclear Power Plant, held online on January 11, 2023.
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesUse the ethical hacking methodology and thought process to perform a successful ethical hackExplore the various stages of an ethical hack and the tools related to each phasePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2024), held at London Metropolitan University, London, UK, during June 2024.
Fully updated: The complete guide to Cisco Identity Services Engine solutions Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access to your networks in a Bring Your Own Device (BYOD) world.
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacksThis professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget.
Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries.
Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life.
This book constitutes the refereed proceedings of the 20th International Workshop on Security and Trust Management (ERCIM STM 2024), held in Bydgoszcz, Poland, during September 19-20, 2024 and co-located with ESORICS 2024 conference.
Become a cyber-hero - know the common wireless weaknesses "e;Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.
This book constitutes the thoroughly refereed post conference papers of the Second International Conference on Blockchain and Trustworthy Systems, Blocksys 2020, held in Dali, China*, in August 2020.
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches.
This book constitutes the refereed proceedings of the First International Conference on Intelligent Technologies and Applications, INTAP 2018, held in Bahawalpur, Pakistan, in October 2018.
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution.
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023.
This book constitutes the refereed proceedings of the 9th International Conference on Security Standardisation Research, SSR 2024, held in Kunming, China, during December 16, 2024.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in Africa, AFRICACRYPT 2024, held in Douala, Cameroon, in July 2024.
The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which was held from May 1-5, 2023, in Bol, Croatia.
This in-depth guide reveals the art of mobile forensics investigation with comprehensive coverage of the entire mobile forensics investigation lifecycle, from evidence collection through advanced data analysis to reporting and presenting findings.
This book constitutes refereed proceedings of the First International Conference on Emerging Networking Architecture and Technologies, ICENAT 2022, held in Shenzhen, China, in October 2022.
This book constitutes the refereed post-conference proceedings of the 6th International Conference on Advancement of Science and Technology, ICAST 2018, which took place in Bahir Dar, Ethiopia, in October 2018.
This two-volume constitutes the refereed proceedings of the First International Conference on Advancements in Smart Computing and Information Security, ASCIS 2022, held in Rajkot, India, in November 2022.
This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019.
This two-volume set LNICST 286-287 constitutes the post-conference proceedings of the First EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2019, held in Harbin, China, in May 2019.
This book constitutes the proceedings of the 20th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2023, held in Hamburg, Germany, in July 2023.
This book constitutes the workshop proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018.
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies.
Master the art of designing, developing, and operating secure infrastructures on Google CloudKey FeaturesPrepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for building a secure and compliant cloud environmentExplore advanced concepts like Security Command Center, BeyondCorp Zero Trust, and container securityBook DescriptionGoogle Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments.