How disputes over privacy and security have shaped the relationship between the European Union and the United States and what this means for the futureWe live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy.
This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR).
This book constitutes the refereed proceedings of the Second International Conference on Artificial Intelligence Security and Privacy, AIS&P 2024, held in Guangzhou, China, during December 6-7, 2024.
Build a network security threat model with this comprehensive learning guideKey FeaturesDevelop a network security threat model for your organizationGain hands-on experience in working with network scanning and analyzing toolsLearn to secure your network infrastructureBook DescriptionThe tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures.
This book features selected research papers presented at the Second International Conference on Computing, Communications, and Cyber-Security (IC4S 2020), organized in Krishna Engineering College (KEC), Ghaziabad, India, along with Academic Associates; Southern Federal University, Russia; IAC Educational, India; and ITS Mohan Nagar, Ghaziabad, India during 3-4 October 2020.
The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources.
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment.
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies.
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.
This book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life.
This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing.
This book provides a thorough and unique overview of the challenges, opportunities and solutions related with data protection in the age of AI and ML technologies.
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey FeaturesPerform evidence acquisition, preservation, and analysis using a variety of Kali Linux toolsUse PcapXray to perform timeline analysis of malware and network activityImplement the concept of cryptographic hashing and imaging using Kali LinuxBook DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics.
Leading technology scholars examine how networks powered by algorithms are transforming humanity, posing deep questions about power, freedom, and fairness.
This book constitutes revised selected papers from the 16th Workshop on e-Business, WeB 2017, which took place in Seoul, South Korea, in December 2017.
Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics.
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model).
The convergence of Artificial Intelligence (AI) and Financial Technology (Fintech) has ushered in a new era of innovation in the finance ecosystem, particularly within the context of the digital gig economy.
Most applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services.
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security.
If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers for digital transformation and innovation, Digital Fluency is your handy guide.