This book constitutes the proceedings of the 9th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2023, which took place in Canterbury, UK, in August 2023.
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2022, which took place in Sousse, Tunesia, during December 7-9, 2022.
This volume constitutes the proceedings presented at the 4th International Conference on Emerging Information Security and Applications, EISA 2023, held in Hangzhou, China, in December 2023.
This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022.
The book presents selected papers from the 18th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, held on December 16-18, 2022, in Kitakyushu, Japan.
This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage.
This book constitutes the refereed proceedings of the 6th Multidisciplinary International Symposium on Disinformation in Open Online Media, MISDOOM 2024, held in Munster, Germany, during September 2-4, 2024.
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users.
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024.
The book presents the proceedings of the 10th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2022), held at NIT Mizoram, Aizawl, Mizoram, India during 18 - 19 June 2022.
This book constitutes the proceedings of the 19th IMA International Conference, IMACC 2023, held in London, UK, during December 12-14, 2023The 14 full papers included in this volume were carefully reviewed and selected from 36 submissions.
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023.
This two-volume set constitutes the proceedings of the Third Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2019, held in Volgograd, Russia, in September 2019.
Advances in Systems Safety contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK, in February 2011.
The book presents selected papers from NIELIT's International Conference on Communication, Electronics and Digital Technology (NICEDT-2024) held during 16-17 February 2024 in Guwahati, India.
In today's digital transformation environments, a rigorous cybersecurity approach to effective risk management - including contingency planning, outlining immediate actions, preparing post-breach responses - is central to defending organizations' interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 36th International Conference on Advanced Information Systems Engineering, CAiSE 2024, which was held in Limassol, Cyprus, during June 2024.
This volume constitutes the proceedings of the 12th International Conference on Cloud Computing, CLOUD 2019, held as part of the Services Conference Federation, SCF 2019, in San Diego, CA, USA, in June 2019.
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks.
This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, which took place in Rennes, France, during June 18–19, 2025.
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
This book, authored by some of the pioneers in the security certification domain, provides a foundational knowledge base for designing and deploying effective security certification schemes for cloud-edge distributed systems.
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power.
This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power.
In this essential, Martin Pils unfolds a clear vision for effective security awareness programs aimed at strengthening the human element in cyber defense.