With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model.
This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.
This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains.
This book constitutes the thoroughly refereed post conference papers of the First International Conference on Blockchain and Trustworthy Systems, Blocksys 2019, held in Guangzhou, China, in December 2019.
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker s repertoire why hack into something when you could just ask for access?
This book is a collection of the best research papers presented at the First World Conference on Internet of Things: Applications & Future (ITAF 2019), Sponsored by GR Foundation and French University in Egypt, held at Triumph Luxury Hotel, Cairo, Egypt, on 14-15 October 2019.
Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices.
Using both a theoretical argumentation and an empirical investigation, this book rationalizes the view that in order to understand people's privacy perceptions and behaviors, a situational perspective needs to be adopted.
Privacy: Algorithms and Society focuses on encryption technologies and privacy debates in journalistic crypto-cultures, countersurveillance technologies, digital advertising, and cellular location data.
This book provides extensive insights on blockchain systems, starting from a historical perspective and moving towards building foundational knowledge, with focus on communication networks.
With the recent debacle of cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of comprehending the security and regulations of Web3, cryptocurrency, and blockchain projects has been magnified.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics.
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed.
This book presents a detailed exploration of adaption and implementation, as well as a 360-degree view spectrum of blockchain technologies in real-world business applications.
This book constitutes the proceedings of the 30th International Conference on Web Services, ICWS 2023, held as Part of the Services Conference Federation, SCF 2023, held in Honolulu, HI, USA, in September 2023.
This book focuses on protection needs and new aspects of personality and data protection rights on the Internet, presenting a comprehensive review that discusses and compares international, European and national (Brazilian, German, Pakistani) perspectives.
In a world increasingly driven by technology, this book explores the intersection of artificial intelligence (AI), IoT, and Cloud Computing and women's safety, highlighting the transformative potential of technology in safeguarding women's well-being in the physical and the digital world.
Understand your GDPR obligations and prioritise the steps you need to take to complyThe GDPR gives individuals significant rights over how their personal information is collected and processed, and places a range of obligations on organisations to be more accountable for data protection.
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practicesKey FeaturesExplore useful recipes for implementing robust cloud security solutions on AWSMonitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and MaciePrepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offeringsBook DescriptionAs a security consultant, securing your infrastructure by implementing policies and following best practices is critical.
The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information.
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume.
The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data.
This book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise.
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018.
This work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to behave in a certain way.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection.
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr.