This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics.
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door for cybercriminals to penetrate hospital networks.
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy.
This book constitutes revised selected papers from the 16th Workshop on e-Business, WeB 2017, which took place in Seoul, South Korea, in December 2017.
As design continues to impact our products, services, and solutions at scale, it is more important than ever to understand the systems and context that surround design decisions.
Artificial Intelligence (AI) has revolutionized several sectors, with digital forensics being one that has been notably affected by its rapid advancement.
Dieses Buch aus der Reihe „Neue Ansätze für die IT-Revision“ entwickelt aktuelle und neuartige Methoden für die Arbeit der Revision sowie für Prüfungen und Tests von IT-Systemen.
Discusses the evolution of WHOIS and how policy changes will affect WHOIS place in IT today and in the futureThis book provides a comprehensive overview of WHOIS.
Das Standard-Datenschutzmodell (SDM) gilt spätestens seit 2020 deutschlandweit als etabliert, um normative Anforderungen der DSGVO in funktionale Anforderungen an die Praxis der Datenverarbeitungen zu transformieren.
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyPerform malware analysis for effective incident responseExplore real-life scenarios that effectively use threat intelligence and modeling techniquesBook DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks.
The Internet of Things (IoT) is a network of devices and smart things that provides a pervasive environment in which people can interact with both the cyber and physical worlds.
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of EthereumKey FeaturesBuild end-to-end decentralized Ethereum apps using Truffle, Web3, and SolidityExplore various solution-based recipes to build smart contracts and foolproof decentralized applicationsDevelop decentralized marketplaces from scratch, build wallets, and manage transactionsBook DescriptionEthereum and Blockchain will change the way software is built for business transactions.
This book focuses on artificial intelligence (AI) and machine learning (ML) technologies and how they are progressively being incorporated into a wide range of products, including consumer gadgets, "e;smart"e; personal assistants, cutting-edge medical diagnostic systems, and quantum computing systems.
Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices.
This book constitutes the proceedings of the 5th International Conference on Financial Technology, ICFT 2024, held in Singapore during September 23-25, 2024.
The subjects of Privacy and Data Protection are more relevant than ever, and especially since 25 May 2018, when the European General Data Protection Regulation became enforceable.
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities.
In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape.
A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services.
This book constitutes the refereed proceedings of the 7th International Conference on Cognitive Computing, ICCC 2023, held in Shenzhen, China, during December 17-18, 2023.
Identify, exploit, and test web application security with easeKey FeaturesGet up to speed with Metasploit and discover how to use it for pentestingUnderstand how to exploit and protect your web environment effectivelyLearn how an exploit works and what causes vulnerabilitiesBook DescriptionMetasploit has been a crucial security tool for many years.
Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019In modern times, all individuals need to be knowledgeable about cybersecurity.
The definitive guide for ensuring data privacy and GDPR compliance Privacy regulation is increasingly rigorous around the world and has become a serious concern for senior management of companies regardless of industry, size, scope, and geographic area.
This book includes the proceedings of the fourth workshop on recommender systems in fashion and retail (2022), and it aims to present a state-of-the-art view of the advancements within the field of recommendation systems with focused application to e-commerce, retail, and fashion by presenting readers with chapters covering contributions from academic as well as industrial researchers active within this emerging new field.
This book constitutes the refereed proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016, held in Hyderabad, India, in December 2016.
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team programLeverage the homefield advantage to stay ahead of your adversariesUnderstand core adversarial tactics and techniques, and protect pentesters and pentesting assetsBook DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches.
All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another.