This book constitutes late breaking papers from the 22nd International Conference on Human-Computer Interaction, HCII 2020, which was held in July 2020.
The three-volume set LNCS 10860, 10861 + 10862 constitutes the proceedings of the 18th International Conference on Computational Science, ICCS 2018, held in Wuxi, China, in June 2018.
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11-13, 2023.
The three volume proceedings LNAI 11051 - 11053 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2018, held in Dublin, Ireland, in September 2018.
This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019.
This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019.
Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT 2020, held in Bangalore, India, in December 2020.
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021.
This two-volume set constitutes the refereed proceedings of the 13th International Conference on Telematics and Computing , WITCOM 2024, which took place in Mazatlan, Mexico, during November 4-8, 2024.
The availability and security of many services we rely upon-including water treatment, electricity, healthcare, transportation, and financial transactions-are routinely put at risk by cyber threats.
In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws.
This book gathers outstanding research papers presented at the International Conference on Frontiers in Computing and Systems (COMSYS 2020), held on January 13-15, 2019 at Jalpaiguri Government Engineering College, West Bengal, India and jointly organized by the Department of Computer Science & Engineering and Department of Electronics & Communication Engineering.
This is a technical overview of the field of adversarial machine learning which has emerged to study vulnerabilities of machine learning approaches in adversarial settings and to develop techniques to make learning robust to adversarial manipulation.
This book constitutes the proceedings of the 8th International Conference on Ad Hoc Networks, ADHOCNETS 2016, held in Ottawa, Canada, September 26-17, 2016.
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.
This book constitutes the proceedings of the 18th IFIP International Conference on Distributed Applications and Interoperable Systems, DAIS 2018, held in Madrid, Spain, in June 2018.
A practical guide to establishing a risk-based, business-focused information security program to ensure organizational successKey FeaturesFocus on business alignment, engagement, and support using risk-based methodologiesEstablish organizational communication and collaboration emphasizing a culture of securityImplement information security program, cybersecurity hygiene, and architectural and engineering best practicesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionInformation Security Handbook is a practical guide that'll empower you to take effective actions in securing your organization's assets.
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity.
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
Praise for Sarbanes-Oxley Guide for Finance and Information Technology Professionals "e;Effective SOX programs enlist the entire organization to build and monitor a compliant control environment.
This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and Blockchain Technology (CBT 2017) held in Oslo, Norway, in September 2017.
This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, held in Verona, Italy, in July 2015.
This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Image Analysis and Recognition, ICIAR 2016, held in Povoa de Varzim, Portugal, in July 2016.
This book constitutes the proceedings of the 17th International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020.
Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.
This book constitutes the refereed proceedings of the 19th International Conference on Information Security Practice and Experience, ISPEC 2024, held in Wuhan, China, during October 25-27, 2024.
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Dr.
This book constitutes the proceedings of the 5th International Conference on Interactive Theorem Proving, ITP 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, in Vienna, Austria, in July 2014.
Il volume ha a oggetto sia gli attuali criteri di distribuzione dei contenuti audiovisivi digitali sia gli emergenti problemi per gli utenti finali non più semplici consumatori ma anche produttori di informazione.
This book examines the requirements, risks, and solutions to improve the security and quality of complex cyber-physical systems (C-CPS), such as production systems, power plants, and airplanes, in order to ascertain whether it is possible to protect engineering organizations against cyber threats and to ensure engineering project quality.
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2024), held at London Metropolitan University, London, UK, during June 2024.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Trustworthy Global Computing, TGC 2013, held in Buenos Aires, Argentina, in August 2013.