In a world where cyber threats are more pervasive and sophisticated than ever, this book serves as a trusted companion for professionals charged with protecting critical digital assets.
Die Corona-Pandemie führte in Deutschland zu massiven, mittelbaren Eingriffen in das Recht auf informationelle Selbstbestimmung – insbesondere durch verpflichtende Kundenkontaktdatenverarbeitungsregelungen in privaten Einrichtungen durch Corona-Rechtsverordnungen.
This book provides a systematic and comprehensive analysis of the full spectrum of Russian influence operations targeting international actors and various segments of society following the onset of the war in Ukraine.
This book provides a systematic and comprehensive analysis of the full spectrum of Russian influence operations targeting international actors and various segments of society following the onset of the war in Ukraine.
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.
This book constitutes the proceedings of the 6th International Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2025, held in Volgograd, Russia, during September 22–25, 2025.
The two-volume set LNBIP 572 + 573 constitutes selected papers from the 22nd European, Mediterranean, and Middle Eastern Conference, EMCIS 2025, which was held in Paphos, Cyprus, during September 11-12, 2025.
The two-volume set LNBIP 572 + 573 constitutes selected papers from the 22nd European, Mediterranean, and Middle Eastern Conference, EMCIS 2025, which was held in Paphos, Cyprus, during September 11-12, 2025.
This book constitutes the proceedings of the 6th International Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2025, held in Volgograd, Russia, during September 22–25, 2025.
This book constitutes the refereed proceedings of the 4th EAI International Conference on Blockchain Technology and Emerging Applications, BlockTEA 2025, held in Venice, Italy, during September 18–19, 2025.
This book constitutes the refereed proceedings of the 4th EAI International Conference on Blockchain Technology and Emerging Applications, BlockTEA 2025, held in Venice, Italy, during September 18–19, 2025.
Welcome to "e;Evolune,"e; a far-reaching adventure set in the year 11000, where the frontiers of Virtual Reality (VR), AI, Blockchain technology, and the Metaverse converge.
Welcome to "e;Evolune,"e; a far-reaching adventure set in the year 11000, where the frontiers of Virtual Reality (VR), AI, Blockchain technology, and the Metaverse converge.
In a world where cyber threats are more pervasive and sophisticated than ever, this book serves as a trusted companion for professionals charged with protecting critical digital assets.
In the last few years, the protection of computerised medical records, and of other personal health information, has become the subject of both technical research and political dispute in a number of countries.
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols.
Das Buch verhilft Lesern dazu, das eigene Netz mit den Augen des Angreifers zu sehen – um seine Techniken zu verstehen und um sich besser schützen zu können.
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers.
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration.
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration.
AI Forensics provides a comprehensive framework for investigating artificial intelligence systems when they fail, cause harm, or become subjects of legal or regulatory scrutiny.
In today's digital age, understanding the legal and ethical rules that govern cyberspace is essential-not just for future lawyers, but for anyone navigating careers in media, technology, business or government.
In today's digital age, understanding the legal and ethical rules that govern cyberspace is essential-not just for future lawyers, but for anyone navigating careers in media, technology, business or government.
The Critical Infrastructure Protection Survey recently released by Symantec found that 53% of interviewed IT security experts from international companies experienced at least ten cyber attacks in the last five years, and financial institutions were often subject to some of the most sophisticated and large-scale cyber attacks and frauds.
Cryptology, for millennia a "e;secret science"e;, is rapidly gaining in practical importance for the protection of communication channels, databases, and software.
AI Forensics provides a comprehensive framework for investigating artificial intelligence systems when they fail, cause harm, or become subjects of legal or regulatory scrutiny.
On behalf of the program committee, it is our pleasure to present to you the proceedings of the fourth Recent Advances in Intrusion Detection Symposium.