The cyber infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
This book is the 2nd volume of proceedings of the 1st Smart Nuclear Power Technology Forum and the 8th China Nuclear Power Plant Digital Technology and Application Seminar held in Shenzhen, China in June 2024.
This book constitutes the refereed proceedings of the 18th International Conference on Network and System Security, NSS 2024, held in Abu Dhabi, United Arab Emirates, during November 20–22, 2024.
This book discusses the roles of the Internet of Things (IoT) and machine learning (ML) in smart health care, including the integration of cloud computing with IoT and ML for managing healthcare data.
This book, embarks the reader on a journey into the forefront of innovation where science, engineering, and technology converge to address the pressing challenges of our time.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 37th International Conference on Advanced Information Systems Engineering, CAiSE 2025, which was held in Vienna, Austria, during June 16-20, 2025.
As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security.
Advances in Systems Safety contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK, in February 2011.
Cross-technology communication (CTC) is a technology that enables direct communication between heterogeneous devices that use different wireless standards.
A complete guide to securing the core components of cloud services, with practical, real-world examples using the built-in security features of Azure, AWS, and GCPKey FeaturesDiscover hands-on techniques for implementing robust cloud security implementationProtect your data and cloud infrastructure with tailored security strategies for your businessLearn how to implement DevSecOps, apply encryption, detect threats and misconfigurations, and maintain cloud compliancePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionSecuring cloud resources is no easy task-each provider has its unique set of tools, processes, and challenges, demanding specialized expertise.
This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17-19, 2024.
The book "e;AI-Enabled Healthcare Security: Safeguarding Patient Data and Improving Outcomes"e; focuses on the role of artificial intelligence in enhancing healthcare security and improving patient outcomes.
Cross-technology communication (CTC) is a technology that enables direct communication between heterogeneous devices that use different wireless standards.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book covers several essential aspects of pervasive ambient backscatter communication, one of the most cutting-edge technologies for Internet-of-Things.
This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17-19, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
In an age of rapid technological progress and digital transformation, the convergence of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security.
This book constitutes the refereed proceedings of the 18th International Conference on Network and System Security, NSS 2024, held in Abu Dhabi, United Arab Emirates, during November 20–22, 2024.
This book, embarks the reader on a journey into the forefront of innovation where science, engineering, and technology converge to address the pressing challenges of our time.
The cyber infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
Software Telemetry shows you how to efficiently collect, store, and analyze system and application log data so you can monitor and improve your systems.