The book is a collection of best selected research papers presented at the International Conference on Advances in Information Communication Technology and Computing (AICTC 2024), held in NJSC South Kazakhstan State Pedagogical University, Shymkent City, Kazakhstan, during April 29-30, 2024.
The book is a collection of best selected research papers presented at the International Conference on Advances in Information Communication Technology and Computing (AICTC 2024), held in NJSC South Kazakhstan State Pedagogical University, Shymkent City, Kazakhstan, during April 29-30, 2024.
In einer Welt, die zunehmend von digitalen Technologien geprägt ist, gewinnt das IT-Audit eine Schlüsselrolle in der Sicherung von Daten, Prozessen und Compliance.
This book presents high-quality, peer-reviewed papers from 3rd International Conference on "e;Universal Threats in Expert Applications and Solutions"e; (UNI-TEAS 2024), jointly being organized by IES University, Bhopal, and Shree KKarni Universe College, Jaipur, in association with CSI Jaipur Chapter and Jaipur ACM Professional Chapter during January 6-9, 2024.
This unique new volume analyses source documents both previously known and recently declassified, generating an extremely broad and original synthesis about Enigma.
This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3-4 January 2024.
This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3-4 January 2024.
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs).
Changes in the global environment, the complexity of decision-making, and the new role of social media have challenged the operating models and practices of traditional crisis preparedness and security of supply.
Changes in the global environment, the complexity of decision-making, and the new role of social media have challenged the operating models and practices of traditional crisis preparedness and security of supply.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
Step into the next frontier of technology with The Quantum Internet Revolution, a groundbreaking exploration of the science, innovations, and transformative potential of quantum networking.
In todays digital age, where data preservation is the cornerstone of security and communications, safeguarding this invaluable asset has never been more critical.