This book constitutes the refereed post-conference proceedings of the Second International Workshop on Information & Operational Technology (IT & OT) security systems, IOSec 2019 , the First International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the First International Workshop on Security for Financial Critical Infrastructures and Services, FINSEC 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019.
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables.
This book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linkoping, Sweden, in September 2019.
The three volume proceedings LNAI 11051 - 11053 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2018, held in Dublin, Ireland, in September 2018.
This volume constitutes the refereed proceedings of the 14th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2019, held in Leon, Spain, in September 2019.
This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019.
This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018.
This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.
The three volume proceedings LNAI 11051 - 11053 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2018, held in Dublin, Ireland, in September 2018.
This book constitutes revised selected papers from the 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018, held in Kaunas, Lithuania, in September 2018.
This book is aimed at a diverse audience including students, researchers, academicians, cybersecurity professionals, IT managers, Metaverse developers, business leaders, policymakers, and tech enthusiasts.
Discussing social media-related scholarship found in criminology, legal studies, policing, courts, corrections, victimization, and crime prevention, this book presents the current state of our knowledge on the impact of social media and the major sociological frameworks employed to study the U.
Defend against today's most devious attacksFully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits.
Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world.
Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer theHuffington Post says "e;knows all of Anonymous' deepest, darkest secrets.
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies.
By imparting crucial insights into the digital evolution of far-right extremism and its challenges, this book explores how far-right extremism has transformed, utilising digital spaces for communication and employing coded language to evade detection.
In today's digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation.
This book is aimed at a diverse audience including students, researchers, academicians, cybersecurity professionals, IT managers, Metaverse developers, business leaders, policymakers, and tech enthusiasts.
Understanding Victimology: An Active Learning Approach is the only textbook with extensive discussion of both online and offline victimization reinforced by group and individual learning activities.
Understanding Victimology: An Active Learning Approach is the only textbook with extensive discussion of both online and offline victimization reinforced by group and individual learning activities.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.
This book, Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics, is a comprehensive guide that explores the intricate world of digital security and forensics.
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies.
THE INSTANT NEW YORK TIMES BESTSELLER'An intricately detailed, deeply sourced and reported history of the origins and growth of the cyberweapons market .
WINNER OF THE FT & McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021The instant New York Times bestsellerA Financial Times and The Times Book of the Year'A terrifying expos ' The Times'Part John le Carr .