Master network security and cryptography with this in-depth guide covering essential concepts, techniques, and advanced topics for protecting data and networks.
This book constitutes the refereed proceedings of the 13th International Symposium on Visual Computing, ISVC 2018, held in Las Vegas, NV, USA in November 2018.
This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in Jeju Island, South Korea, during August 23-25, 2023.
This book presents the outcomes of the 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cybercrime.
This book contains best selected research papers presented at ICTCS 2022: Seventh International Conference on Information and Communication Technology for Competitive Strategies.
This two-volume set (CCIS 1045 and CCIS 1046) constitutes the refereed proceedings of the Third International Conference on Advances in Computing and Data Sciences, ICACDS 2019, held in Ghaziabad, India, in April 2019.
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016.
Digitale Dienste werden für unsere Gesellschaft immer wichtiger, daher gelangen sie auch stärker ins Visier von Wirtschaftskriminellen, Spionen, Terroristen oder staatsfeindlichen Gruppierungen.
Pass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey FeaturesPass the CISM exam confidently with this step-by-step guideExplore practical solutions that validate your knowledge and expertise in managing enterprise information security teamsEnhance your cybersecurity skills with practice questions and mock testsBook DescriptionWith cyber threats on the rise, IT professionals are now choosing cybersecurity as the next step to boost their career, and holding the relevant certification can prove to be a game-changer in this competitive market.
The three volume set LNCS 13155, 13156, and 13157 constitutes the refereed proceedings of the 21st International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2021, which was held online during December 3-5, 2021.
This two-volume set, CCIS 2315 and CCIS 2316, constitutes the refereed proceedings of the 7th International Conference on Frontiers in Cyber Security, FCS 2024 held in Chongqing, China, during July 26-28, 2024.
This book constitutes the joint refereed proceedings of the 17th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2017, the 10th Conference on Internet of Things and Smart Spaces, ruSMART 2017.
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022.
This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs).
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019.
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024.
This book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linkoping, Sweden, in September 2019.
Your one stop guide to automating infrastructure security using DevOps and DevSecOpsKey FeaturesSecure and automate techniques to protect web, mobile or cloud servicesAutomate secure code inspection in C++, Java, Python, and JavaScriptIntegrate security testing with automation frameworks like fuzz, BDD, Selenium and Robot FrameworkBook DescriptionSecurity automation is the automatic handling of software security assessments tasks.
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014.
This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, held in Abhu Dabhi, United Arab Emirates, during March 5-8, 2024.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2018, which took place in Faro, Portugal, in September 2018.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
This text examines the goals of data analysis with respect to enhancing knowledge, and identifies data summarization and correlation analysis as the core issues.
This book contains practical steps business users can take to implement data management in a number of ways, including data governance, data architecture, master data management, business intelligence, and others.
This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Interplay of Security, Safety and System/Software Architecture, CSITS 2018, and the International Workshop on Cyber Security for Intelligent Transportation Systems, ISSA 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018.
This book constitutes the refereed proceedings of the 13th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2016, held in Athens.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks.
This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime.
This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler examPrepare for the challenging GIAC Certified Incident Handler exam using the detailed information contained in this effective exam preparation guide.
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hackedExplore a variety of advanced Linux security techniques with the help of hands-on labsMaster the art of securing a Linux environment with this end-to-end practical guideBook DescriptionFrom creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades.
So far, little effort has been devoted to developing practical approaches on how to develop and deploy AI systems that meet certain standards and principles.
We are at the threshold of a new area of the internet that promises to transform the way we engage financially and take the power of data and privacy back from big corporations and give it to the individual through decentralization.
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020.
This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024.