The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
System Innovation for a Global Economy contains the contribution to the 2025 International Conference on Applied System Innovation (ICASI 2025, Tokyo, Japan, April 22-25, 2025).
System Innovation for a Global Economy contains the contribution to the 2025 International Conference on Applied System Innovation (ICASI 2025, Tokyo, Japan, April 22-25, 2025).
This book provides a comprehensive overview of cybersecurity management in ports, cybersecurity vulnerabilities, and managerial strategies to improve cyber resilience.
Decentralized Optimization in Networks: Algorithmic Efficiency and Privacy Preservation provides the reader with theoretical foundations, practical guidance, and solutions to decentralized optimization problems.
Master the complete Generative AI project lifecycle on Kubernetes (K8s) from design and optimization to deployment using best practices, cost-effective strategies, and real-world examples.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
En un contexto donde la precision tecnica y la claridad conceptual son indispensables, Blockchain Glosario se presenta como una herramienta fundamental para profesionales, estudiantes y organizaciones que requieren comprender con exactitud el lenguaje del ecosistema blockchain.
Expert guide to create Zero Trust digital environments in an AI-everywhere landscape Rise of the Machines: A Project Zero Trust Story is a continuation of the 2023 bestseller Project Zero Trust, picking up where the first book left off and addressing issues not covered in the first installment: artificial intelligence, mergers and acquisitions, antivirus, business continuity, and remote work.
An expertly written guide to the regulatory maze governing the intersection of technology and national security In Navigating Technology and National Security: The Intersection of CFIUS, Team Telecom, AI Controls, and Other Regulations, cybersecurity and technology policy researcher, consultant, and professor Justin Sherman delivers a comprehensive explanation of US tech and national security regulations and review programs.
Deliver measurable business value by applying strategic, technical, and ethical frameworks to AI initiatives at scaleFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesBuild AI strategies that align with business goals and maximize ROIImplement enterprise-ready frameworks for MLOps, LLMOps, and Responsible AILearn from real-world case studies spanning industries and AI maturity levelsBook DescriptionAI is only as valuable as the business outcomes it enables, and this hands-on guide shows you how to make that happen.
An expertly written guide to the regulatory maze governing the intersection of technology and national security In Navigating Technology and National Security: The Intersection of CFIUS, Team Telecom, AI Controls, and Other Regulations, cybersecurity and technology policy researcher, consultant, and professor Justin Sherman delivers a comprehensive explanation of US tech and national security regulations and review programs.
This book includes extended and revised versions of a set of selected papers presented at the 20th International Conference on Security and Cryptography, SECRYPT 2023, which took place in Rome, Italy, during July 10–12, 2023; and the 21st International Conference on Security and Cryptography, SECRYPT 2024, which was held in Dijon, France, during July 8-10, 2024.
Event-driven microservices offer an optimal approach to harnessing event streams, reacting and responding to changes as they occur across your company.
Event-driven microservices offer an optimal approach to harnessing event streams, reacting and responding to changes as they occur across your company.
Microsoft Sentinel for Internet of Medical Things (IoMT) provides advanced threat detection, investigation, and automated response for connected medical devices, guaranteeing real-time protection in healthcare environments.
Advances in Fog Computing and the Internet of Things for Smart Healthcare delves into the transformative impact of fog computing and IoT on modern healthcare systems.
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012.
This book is based on the best papers accepted for presentation during the AISMA-2025: International Workshop on Advanced in Information Security Management and Applications.
Become a cybersecurity expert with comprehensive CAS-005 preparation using this detailed guide packed with practical insights, mock exams, diagrams, and actionable strategies that align with modern enterprise security demandsKey FeaturesStrengthen your grasp of key concepts and real-world security practices across updated exam objectivesGauge your preparedness with over 300 practice questions, flashcards, and mock examsVisualize complex topics with diagrams of AI-driven threats, Zero Trust, cloud security, cryptography, and incident responseBook DescriptionAs cyber threats evolve at unprecedented speed and enterprises demand resilient, scalable security architectures, the CompTIA SecurityX CAS-005 Certification Guide stands as the definitive preparation resource for today's security leaders.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015.
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015.
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015.
This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2014, and Ontologies, Databases, and Applications of Semantics, ODBASE 2014, held as part of OTM 2014 in October 2014 in Amantea, Italy.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013.
This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014.
This book constitutes the refereed proceedings of the Third European Conference on Service-Oriented and Cloud computing, ESOCC 2014, held in Manchester, UK, in September 2014.
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014.
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2013, held in Beijing, China, in November 2013.
This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013.
This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014.
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014.
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013).
This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan.