Die Corona-Pandemie führte in Deutschland zu massiven, mittelbaren Eingriffen in das Recht auf informationelle Selbstbestimmung – insbesondere durch verpflichtende Kundenkontaktdatenverarbeitungsregelungen in privaten Einrichtungen durch Corona-Rechtsverordnungen.
Kaum eine Organisation kommt heutzutage ohne die Verarbeitung großer Mengen personenbezogener Daten in Informationssystemen aus, so dass sie sich konsequenterweise mit der Umsetzung datenschutzrechtlicher Anforderungen befassen müssen.
Kaum eine Organisation kommt heutzutage ohne die Verarbeitung großer Mengen personenbezogener Daten in Informationssystemen aus, so dass sie sich konsequenterweise mit der Umsetzung datenschutzrechtlicher Anforderungen befassen müssen.
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that transpire within its hidden corridors using Dark Web-AI-Offensive tactics.
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that transpire within its hidden corridors using Dark Web-AI-Offensive tactics.
Take the complexity out of privacy management with this guide to ISO 27701:2025 - the go-to resource for anyone who needs a fast, reliable understanding of privacy information management.
Libro especializado que se ajusta al desarrollo de la cualificacion profesional y adquisicion del certificado de profesionalidad "e;IFCT0109 - PROGRAMACION DE SISTEMAS INFORMATICOS"e;.
Take the complexity out of privacy management with this guide to ISO 27701:2025 - the go-to resource for anyone who needs a fast, reliable understanding of privacy information management.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
Los avances en la ciencia del cerebro y las neurotecnologias abren nuevas vias para mejorar el diagnostico y el tratamiento de los trastornos mentales, y de las enfermedades neurologicas en general.
This book explores Internet of Medical Things (IoMT) security and privacy in electronic healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks.
This book explores Internet of Medical Things (IoMT) security and privacy in electronic healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks.
This handbook offers a thorough examination of the ever-changing landscape of cybersecurity, exploring the critical challenges and innovative solutions that shape the field during the era of digital transformation.
Cybernetic Shield: Securing the Future of Machine Intelligence explores the critical intersection between cybersecurity and the rapid advancements in artificial intelligence.
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
Cybernetic Shield: Securing the Future of Machine Intelligence explores the critical intersection between cybersecurity and the rapid advancements in artificial intelligence.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation.
This handbook offers a thorough examination of the ever-changing landscape of cybersecurity, exploring the critical challenges and innovative solutions that shape the field during the era of digital transformation.
This book constitutes the refereed proceedings of the Second International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2025, held in Prague, Czech Republic, on September 26, 2025.
This book constitutes the refereed proceedings of the Second International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2025, held in Prague, Czech Republic, on September 26, 2025.
With the proliferation of biometric technology such as face, fingerprint, iris and voice recognition, concerns have arisen regarding the vulnerability of our biometric data.
With the proliferation of biometric technology such as face, fingerprint, iris and voice recognition, concerns have arisen regarding the vulnerability of our biometric data.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.