This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the refereed proceedings of the Second International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2025, held in Prague, Czech Republic, on September 26, 2025.
This book constitutes the refereed proceedings of the Second International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2025, held in Prague, Czech Republic, on September 26, 2025.
With the proliferation of biometric technology such as face, fingerprint, iris and voice recognition, concerns have arisen regarding the vulnerability of our biometric data.
With the proliferation of biometric technology such as face, fingerprint, iris and voice recognition, concerns have arisen regarding the vulnerability of our biometric data.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This book constitutes the refereed proceedings of the 9th International Conference on Cognitive Computing, ICCC 2025, Held as Part of the Services Conference Federation, SCF 2025, held in Hong Kong, during September 27–30, 2025.
This book constitutes the proceedings of the 32nd International Conference on Web Services – ICWS 2025, held as Part of the Services Conference Federation, SCF 2025 in Hong Kong, China during September 27–30, 2025.
This book constitutes the refereed proceedings of the 9th International Conference on Cognitive Computing, ICCC 2025, Held as Part of the Services Conference Federation, SCF 2025, held in Hong Kong, during September 27–30, 2025.
This book constitutes the proceedings of the 32nd International Conference on Web Services – ICWS 2025, held as Part of the Services Conference Federation, SCF 2025 in Hong Kong, China during September 27–30, 2025.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This three-volume set CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
This three-volume set, CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set, CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set, CCIS 2637-2639 , constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set, CCIS 2637-2639 , constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
This brief addresses the contested relationship between an individual’s right of access to his or her personal data under data protection law and the protection of a whistleblower’s identity.
This brief addresses the contested relationship between an individual’s right of access to his or her personal data under data protection law and the protection of a whistleblower’s identity.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This book constitutes the proceedings of the 5th International Conference on Financial Technology, ICFT 2024, held in Singapore during September 23-25, 2024.
This book constitutes the proceedings of the 5th International Conference on Financial Technology, ICFT 2024, held in Singapore during September 23-25, 2024.
This CCIS post conference volume constitutes the proceedings of the First International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2024, in Bari, Italy, in October 2024.
This CCIS post conference volume constitutes the proceedings of the First International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2024, in Bari, Italy, in October 2024.