Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
The cyber infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
The industrial internet has the characteristics of "e;change"e;, "e;integration"e; and "e;new"e;, and the security risks it faces are greatly different from the traditional Internet.
This book offers a comprehensive overview of buildings' digital information security, focusing on various phases of building projects and their associated challenges.
The industrial internet has the characteristics of "e;change"e;, "e;integration"e; and "e;new"e;, and the security risks it faces are greatly different from the traditional Internet.
This book offers a comprehensive overview of buildings' digital information security, focusing on various phases of building projects and their associated challenges.
This book focuses on the integration of Artificial Intelligence (AI) technology for securing IoT next systems, exploring a comprehensive collection of recent techniques and strategies aimed at protecting these complex networks.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively.
This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively.
This book constitutes the proceedings of the BPM 2025 Responsible BPM Forum, Process Technology Forum, and Educators Forum held at the 23rd International Conference on Business Process Management, BPM 2025, which took place in Seville, Spain, during September 2025.
This book constitutes the refereed proceedings of the 44th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2025, held in Stockholm, Sweden, during September 2025.
This book constitutes the refereed proceedings of the 44th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2025, held in Stockholm, Sweden, during September 2025.
This Second Edition introduces the technical features that make up blockchain technology today, including the numerous changes that have occurred since the publication of the prior edition.
This Second Edition introduces the technical features that make up blockchain technology today, including the numerous changes that have occurred since the publication of the prior edition.
This book constitutes the proceedings of the First Nordic Energy Informatics Academy Conference, Nordic EIA 2025, which took place in Stockholm, Sweden, in August 2025.
This book constitutes the proceedings of the First Nordic Energy Informatics Academy Conference, Nordic EIA 2025, which took place in Stockholm, Sweden, in August 2025.
This book constitutes the proceedings of the First Nordic Energy Informatics Academy Conference, Nordic EIA 2025, which took place in Stockholm, Sweden, in August 2025.
This book constitutes the proceedings of the First Nordic Energy Informatics Academy Conference, Nordic EIA 2025, which took place in Stockholm, Sweden, in August 2025.
This book constitutes the refereed proceedings of the 10th International Joint Conference on E-Business and Telecommunications, ICETE 2013, held in Reykjavik, Iceland, in July 2013.
This book constitutes the proceedings of the BPM 2025 Responsible BPM Forum, Process Technology Forum, and Educators Forum held at the 23rd International Conference on Business Process Management, BPM 2025, which took place in Seville, Spain, during September 2025.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016.
Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016.
The four-volume set CCIS 2416, 2417, 2418 and 2419 constitutes the refereed post-conference proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024 Spring, held in Beijing, China, during June 14–16, 2024.
The four-volume set CCIS 2416, 2417, 2418 and 2419 constitutes the refereed post-conference proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024 Spring, held in Beijing, China, during June 14–16, 2024.
This book constitutes the refereed proceedings of four workshops held at the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held virtually, in March 2021.
This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017.
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Conference on Financial Cryptography and Data Security, FC 2018, held in Nieuwport, Curacao, in February/ March 2018.
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
This book constitutes the refereed proceedings of four workshops held at the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held virtually, in March 2021.
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.