Without a solid, robust procedure to evaluate digital asset investments, decisions are often made based on hype or influencer reviews, which, in the end, is nothing short of a lottery ticket.
Moving Target Defense (MTD) has been proposed as an innovative defense framework, which aims to introduce the dynamics, diversity and randomization into static network by the shuffling, heterogeneity and redundancy.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2012, held in Palermo, Italy, in September 2012 under the sponsorship of the UNESCO chair in Data Privacy.
This book presents various computational and cognitive modeling approaches in the areas of health, education, finance, environment, engineering, commerce and industry.
This book presents various computational and cognitive modeling approaches in the areas of health, education, finance, environment, engineering, commerce and industry.
Learn the most important topics in securing AWS environments through a strategic combination of fundamental principles, real-case studies, and hands-on practice to battle new generations of cyber-attacks.
This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014.
This book delves into the transformative power of Enterprise Agentic AI, tracing its evolution from basic automation to intelligent agents capable of contextual reasoning, memory retention, and autonomous decision-making.
This two-volume set, CCIS 2624 and CCIS 2625, constitutes the refereed proceedings of the 8th China Intelligent Networked Things Conference, CINT 2025, held in Zhuhai, China, during June 13–15, 2025.
This two-volume set, CCIS 2624 and CCIS 2625, constitutes the refereed proceedings of the 8th China Intelligent Networked Things Conference, CINT 2025, held in Zhuhai, China, during June 13–15, 2025.
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012.
Privacy in statistical databases is a discipline whose purpose is to provide solutions to the tension between the increasing social, political and economical demand of accurate information, and the legal and ethical obligation to protect the privacy of the various parties involved.
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, is about finding tradeoffs to the tension between the increasing societal need for accurate statistical data and the legal and ethical obligation to protect privacy of individuals and enterprises which are the source of data for producing statistics.
Moving Target Defense (MTD) has been proposed as an innovative defense framework, which aims to introduce the dynamics, diversity and randomization into static network by the shuffling, heterogeneity and redundancy.
Privacy in statistical databases is a discipline whose purpose is to provide so- tionstothetensionbetweenthesocial,political,economicandcorporatedemand for accurate information, and the legal and ethical obligation to protect the p- vacy of the various parties involved.
Learn the most important topics in securing AWS environments through a strategic combination of fundamental principles, real-case studies, and hands-on practice to battle new generations of cyber-attacks.
Pro Azure Governance and Security will be an indispensable guide for IT professionals, cloud architects, and security engineers aiming to master the latest governance and security practices within Microsoft Azure.
This book delves into the transformative power of Enterprise Agentic AI, tracing its evolution from basic automation to intelligent agents capable of contextual reasoning, memory retention, and autonomous decision-making.
Without a solid, robust procedure to evaluate digital asset investments, decisions are often made based on hype or influencer reviews, which, in the end, is nothing short of a lottery ticket.
Pro Azure Governance and Security will be an indispensable guide for IT professionals, cloud architects, and security engineers aiming to master the latest governance and security practices within Microsoft Azure.
"e;Identity Management on GCP"e; is a detailed step-by-step guide that helps readers through Identity Management within the Google Cloud Platform (GCP).
"e;Identity Management on GCP"e; is a detailed step-by-step guide that helps readers through Identity Management within the Google Cloud Platform (GCP).
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
The two-volume set LNCS 16223 + 16224 constitutes the refereed proceedings of the 16th International Conference on Decision and Game Theory for Security, GameSec 2025, which took place in Athens, Greece, in October 2025.
The two-volume set LNCS 16223 + 16224 constitutes the refereed proceedings of the 16th International Conference on Decision and Game Theory for Security, GameSec 2025, which took place in Athens, Greece, in October 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
The two-volume set LNCS 16223 + 16224 constitutes the refereed proceedings of the 16th International Conference on Decision and Game Theory for Security, GameSec 2025, which took place in Athens, Greece, in October 2025.
The two-volume set LNCS 16223 + 16224 constitutes the refereed proceedings of the 16th International Conference on Decision and Game Theory for Security, GameSec 2025, which took place in Athens, Greece, in October 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This two-volume set constitutes the proceedings of the 18th biennial AAATE Conference on Technology for Inclusion and Participation for All: Recent Achievements and Future Directions, AAATE 2025, which took place in Nicosia, Cyprus, during September 10-12, 2025.
This book constitutes the refereed proceedings of the Second EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2024, held in Dubai, United Arab Emirates, during December 9–10, 2024.
This book constitutes the refereed proceedings of the Second EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2024, held in Dubai, United Arab Emirates, during December 9–10, 2024.
This book constitutes the proceedings of the 21st International Workshop on Security and Trust Management, STM 2025, held in conjunction with the 30th European Symposium on Computer Security Research (ESORICS 2025), in Toulouse, France, during September 25–26, 2025.
This book constitutes the proceedings of the 21st International Workshop on Security and Trust Management, STM 2025, held in conjunction with the 30th European Symposium on Computer Security Research (ESORICS 2025), in Toulouse, France, during September 25–26, 2025.
This book deals with the tension between law and technology of data protection topic, to propose a novel approach for interpreting personal data protection audit.
This book deals with the tension between law and technology of data protection topic, to propose a novel approach for interpreting personal data protection audit.