This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2019, which was held in Coimbatore, India, in December 2019.
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021.
This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2019, which was held in Coimbatore, India, in December 2019.
There is a growing need for insights and practical experiences in the evolving field of cyber security for business analytics a need addressed by Cyber Security in Business Analytics.
There is a growing need for insights and practical experiences in the evolving field of cyber security for business analytics a need addressed by Cyber Security in Business Analytics.
In an age of rapid technological progress and digital transformation, the convergence of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security.
This book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security.
This book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security.
While the Industrial Internet of Things (IIoT) and Wireless Sensor Networks (WSNs) continue to redefine industrial infrastructure, the need for proactive, intelligent, and scalable cybersecurity solutions has never been more pressing.
This book delves into the revolutionary ways in which AI-driven innovations are enhancing every aspect of cybersecurity, from threat detection and response automation to risk management and endpoint protection.
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing: A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications.
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI.
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape.
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze: Insights and Humor on the Digital Frontier offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity.
Entdecken Sie die psychologischen Tricks und Techniken, mit denen Human Hacker Ihre persönlichen Gefühle, Eigenschaften und digitale Verhaltensmuster ausnutzen, um die Informationssicherheit gezielt zu kompromittieren.
Entdecken Sie die psychologischen Tricks und Techniken, mit denen Human Hacker Ihre persönlichen Gefühle, Eigenschaften und digitale Verhaltensmuster ausnutzen, um die Informationssicherheit gezielt zu kompromittieren.
The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment process to meet the requirements of privacy laws.
Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System is a non-technical explanation of online offences by a cybersecurity expert, bridging the gap between the high-tech world of cybercrime and the non-technical professionals working within it.
Although recent advances in technology have made life easier for individuals, societies, and states, they have also led to the emergence of new and different problems in the context of security.
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity.
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.
In an era where vehicular networks and Location-Based Services (LBS) are rapidly expanding, safeguarding location privacy has become a critical challenge.
In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape.
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity.