This book constitutes the refereed proceedings of the Second International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2025, held in Prague, Czech Republic, on September 26, 2025.
This book constitutes the refereed proceedings of the Second International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2025, held in Prague, Czech Republic, on September 26, 2025.
With the proliferation of biometric technology such as face, fingerprint, iris and voice recognition, concerns have arisen regarding the vulnerability of our biometric data.
With the proliferation of biometric technology such as face, fingerprint, iris and voice recognition, concerns have arisen regarding the vulnerability of our biometric data.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This book constitutes the refereed proceedings of the 9th International Conference on Cognitive Computing, ICCC 2025, Held as Part of the Services Conference Federation, SCF 2025, held in Hong Kong, during September 27–30, 2025.
This book constitutes the proceedings of the 32nd International Conference on Web Services – ICWS 2025, held as Part of the Services Conference Federation, SCF 2025 in Hong Kong, China during September 27–30, 2025.
This book constitutes the refereed proceedings of the 9th International Conference on Cognitive Computing, ICCC 2025, Held as Part of the Services Conference Federation, SCF 2025, held in Hong Kong, during September 27–30, 2025.
This book constitutes the proceedings of the 32nd International Conference on Web Services – ICWS 2025, held as Part of the Services Conference Federation, SCF 2025 in Hong Kong, China during September 27–30, 2025.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This three-volume set CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
This three-volume set, CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set, CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set, CCIS 2637-2639 , constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This three-volume set, CCIS 2637-2639 , constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
Los avances en la ciencia del cerebro y las neurotecnologias abren nuevas vias para mejorar el diagnostico y el tratamiento de los trastornos mentales, y de las enfermedades neurologicas en general.
This brief addresses the contested relationship between an individual’s right of access to his or her personal data under data protection law and the protection of a whistleblower’s identity.
As the world rapidly advances toward unparalleled connectivity and urbanization, the intersection of state-of-the-art telecommunications, smart city initiatives, and the Internet of Things (IoT) holds the potential for revolutionary changes in our daily lives.
This brief addresses the contested relationship between an individual’s right of access to his or her personal data under data protection law and the protection of a whistleblower’s identity.
As the world rapidly advances toward unparalleled connectivity and urbanization, the intersection of state-of-the-art telecommunications, smart city initiatives, and the Internet of Things (IoT) holds the potential for revolutionary changes in our daily lives.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This book constitutes the proceedings of the 5th International Conference on Financial Technology, ICFT 2024, held in Singapore during September 23-25, 2024.
This book constitutes the proceedings of the 5th International Conference on Financial Technology, ICFT 2024, held in Singapore during September 23-25, 2024.
This CCIS post conference volume constitutes the proceedings of the First International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2024, in Bari, Italy, in October 2024.
This CCIS post conference volume constitutes the proceedings of the First International Workshop on Recommender Systems for Sustainability and Social Good, RecSoGood 2024, in Bari, Italy, in October 2024.