Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers 'What to Do When You Get Hacked?
Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity.
This book constitutes the proceedings of the BPM 2024 Blockchain/RPA/CEE/Educators/Industry Forum held at the 22nd International Conference on Business Process Management, BPM 2024, which took place in Krakow, Poland, in September 2024.
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019.
This book constitutes the refereed proceedings of the 25th International Conference on Information and Software Technologies, ICIST 2019, held in Vilnius, Lithuania, in October 2019.
This two-volume set, LNICST 605 and 606, constitutes the refereed post-conference proceedings of the 14th International Conference on Wireless and Satellite Services, WiSATS 2024, held in Harbin, China during August 23-25, 2024.
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14–16, 2024.
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
An all-new exam guide for the industry-standard information technology risk certification, Certified in Risk and Information Systems Control (CRISC)Prepare for the newly-updated Certified in Risk and Information Systems Control (CRISC) certification exam with this comprehensive exam guide.
This book features research papers presented at the 2nd International Conference on Innovations in Data Analytics (ICIDA 2023), held at Eminent College of Management and Technology (ECMT), West Bengal, India during 29 - 30 November 2023.
This book presents the proceedings of the Conference on Algorithms and Applications (ALAP 2018), which focuses on various areas of computing, like distributed systems and security, big data and analytics and very-large-scale integration (VLSI) design.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2024), held at London Metropolitan University, London, UK, during June 2024.
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.
This book constitutes the revised selected papers of the 18th International Conference on Risks and Security of Internet and Systems, CRiSIS 2023, which took place in Rabat, Morocco, during December 6-8, 2023.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016.
The best IT certification exam study system available for CompTIA Network+ Exam N10-006With hundreds of practice exam questions, including new performance-based types, CompTIA Network+ Certification Study Guide, Sixth Edition (Exam N10-006) covers everything you need to know to prepare for this challenging exam.
This up-to-date study aid contains hundreds of accurate practice questions and detailed answer explanationsCompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601) is filled with more than 1000 realistic practice questions including new performance-based questions to prepare you for this challenging exam.
Build a blue team for efficient cyber threat management in your organizationKey FeaturesExplore blue team operations and understand how to detect, prevent, and respond to threatsDive deep into the intricacies of risk assessment and threat managementLearn about governance, compliance, regulations, and other best practices for blue team implementationBook DescriptionWe've reached a point where all organizational data is connected through some network.
Technologys influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products.
This book provides an overview of fake news detection, both through a variety of tutorial-style survey articles that capture advancements in the field from various facets and in a somewhat unique direction through expert perspectives from various disciplines.
The book presents select proceedings of the 3rd International Conference on "e;Artificial-Business Analytics, Quantum and Machine Learning: Trends, Perspectives, and Prospects"e; (Com-IT-Con 2023) held at the Manav Rachna University in July 2023.
This textbook considers cases and materials introducing European Union (EU) data protection law to data protection enthusiasts while acting as a reference point for students and practitioners.
This book aims to highlight the gaps and the transparency issues in the clinical research and trials processes and how there is a lack of information flowing back to researchers and patients involved in those trials.
This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29-31, 2023.
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce.
Open Source Systems Security Certification discusses Security Certification Standards and establishes the need to certify open source tools and applications.
Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guideThis thoroughly updated, money-saving self-study set gathers essential exam-focused resources to use in preparation for the latest Certified Ethical Hacker exam.
This book constitutes the proceedings of the 16th International Conference on Distributed Computing and Internet Technology, ICDCIT 2020, held in Bhubaneswar, India, in January 2020.
This book constitutes the refereed proceedings of the 9th International Conference on Future Data and Security Engineering, FDSE 2022, held in Ho Chi Minh City, Vietnam, during November 23-25, 2022.
The book is a collection of the best-selected research papers presented at the International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications (ICMISC 2023) held in September 2023 at the CMR Institute of Technology, Hyderabad, Telangana, India.
This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020.
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Mobile Computing, Applications, and Services, MobiCASE 2019, held in Hangzhou, China, in June 2019.
This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.
This fascinating book presents the timeless mathematical theory underpinning cryptosystems both old and new, written specifically with engineers in mind.