Take the complexity out of privacy management with this guide to ISO 27701:2025 - the go-to resource for anyone who needs a fast, reliable understanding of privacy information management.
Libro especializado que se ajusta al desarrollo de la cualificacion profesional y adquisicion del certificado de profesionalidad "e;IFCT0109 - PROGRAMACION DE SISTEMAS INFORMATICOS"e;.
Take the complexity out of privacy management with this guide to ISO 27701:2025 - the go-to resource for anyone who needs a fast, reliable understanding of privacy information management.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
Los avances en la ciencia del cerebro y las neurotecnologias abren nuevas vias para mejorar el diagnostico y el tratamiento de los trastornos mentales, y de las enfermedades neurologicas en general.
This book explores Internet of Medical Things (IoMT) security and privacy in electronic healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks.
This book explores Internet of Medical Things (IoMT) security and privacy in electronic healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks.
Cybernetic Shield: Securing the Future of Machine Intelligence explores the critical intersection between cybersecurity and the rapid advancements in artificial intelligence.
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
Cybernetic Shield: Securing the Future of Machine Intelligence explores the critical intersection between cybersecurity and the rapid advancements in artificial intelligence.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation.
This book constitutes the refereed proceedings of the Second International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2025, held in Prague, Czech Republic, on September 26, 2025.
This book constitutes the refereed proceedings of the Second International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2025, held in Prague, Czech Republic, on September 26, 2025.
With the proliferation of biometric technology such as face, fingerprint, iris and voice recognition, concerns have arisen regarding the vulnerability of our biometric data.
With the proliferation of biometric technology such as face, fingerprint, iris and voice recognition, concerns have arisen regarding the vulnerability of our biometric data.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This book constitutes the refereed proceedings of the 9th International Conference on Cognitive Computing, ICCC 2025, Held as Part of the Services Conference Federation, SCF 2025, held in Hong Kong, during September 27–30, 2025.
This book constitutes the proceedings of the 32nd International Conference on Web Services – ICWS 2025, held as Part of the Services Conference Federation, SCF 2025 in Hong Kong, China during September 27–30, 2025.
This book constitutes the refereed proceedings of the 9th International Conference on Cognitive Computing, ICCC 2025, Held as Part of the Services Conference Federation, SCF 2025, held in Hong Kong, during September 27–30, 2025.
This book constitutes the proceedings of the 32nd International Conference on Web Services – ICWS 2025, held as Part of the Services Conference Federation, SCF 2025 in Hong Kong, China during September 27–30, 2025.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This three-volume set CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
This three-volume set, CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set, CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set, CCIS 2637-2639 , constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.