Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyPerform malware analysis for effective incident responseExplore real-life scenarios that effectively use threat intelligence and modeling techniquesBook DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
Artificial Intelligence (AI) in general and machine learning (ML) and deep learning (DL) in particular and related digital technologies are a couple of fledging paradigms that next-generation healthcare services are sprinting towards.
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives.
This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques.
This two-volume set CCIS 2264 and CCIS 2265 constitutes the refereed proceedings of the 6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024, held in Hangzhou, China, during July 12-14, 2024.
The Home in the Digital Age is a set of multidisciplinary studies exploring the impact of digital technologies in the home, with a shift of emphasis from technology to the people living and using this in their homes.
Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality.
Issues of surveillance, control and privacy in relation to the internet are coming to the fore as a result of state concern with security, crime and economic advantage.
The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle.
The Internet of Things (IoT) is a network of devices and smart things that provides a pervasive environment in which people can interact with both the cyber and physical worlds.
Die fortschreitende Digitalisierung, die immer höhere Verfügbarkeit des Internets in Echtzeit sowie die progressive Entwicklung der IT ermöglichen es Unternehmen und Organisationen, Daten in einem nie zuvor dagewesenen Umfang zu erzeugen und zu verarbeiten, wodurch sie einen enormen Stellen- und Marktwert erhalten haben.
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden.
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality.
This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application.
This book constitutes the proceedings of the 31st International Conference on Web Services - ICWS 2024, held as Part of the Services Conference Federation, SCF 2024, in Bangkok, Thailand, during November 16-19, 2024.
This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems.
Justice apps - mobile and web-based programmes that can assist individuals with legal tasks - are being produced, improved, and accessed at an unprecedented rate.
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
This volume constitutes the proceedings of the 26th International Conference on Web Services, ICWS 2019, held as part of SCF 2019 in San Diego, CA, USA in June 2019.
This handbook explores smart cities of the future, provides an understanding of their development and management systems, and discusses the technology challenges.
In today's digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation.
Writing in their famous Harvard Law Review article of 1890, Louis Brandeis and Samuel Warren asserted what many have considered one of the most cherished American values: the right to be let alone.
IT-Sicherheit in kleinen und mittelständischen Unternehmen voranbringenIT- und Informations-Sicherheit ist ein komplexes Thema und die Umsetzung nimmt oft viel Zeit und viele Ressourcen in Anspruch.