The 30-volume set, comprising the LNCS books 12346 until 12375, constitutes the refereed proceedings of the 16th European Conference on Computer Vision, ECCV 2020, which was planned to be held in Glasgow, UK, during August 23-28, 2020.
This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019.
This book constitutes the refereed proceedings of the 12th International Conference on the Quality of Information and Communications Technology, QUATIC 2019, held in Ciudad Real, Spain, in September 2019.
The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020.
This book constitutes revised selected papers from the 10th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, held in Darmstadt, Germany, in April 2019.
The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020.
This book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019.
This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
This book constitutes the refereed proceedings of the Third EAI International Conference on Smart Grid and Internet of Things, SGIoT 2019, held in TaiChung, Taiwan, in November 2019.
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.
This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, held in Prague, Czech Republic, in February 2019.
This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St.
This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Smart Card Research and Advanced Applications, CARDIS 2018, held in Monpellier, France, in November 2018.
This text presents a careful introduction to methods of cryptology and error correction in wide use throughout the world and the concepts of abstract algebra and number theory that are essential for understanding these methods.
This book constitutes the refereed post-conference proceedings of the 6th International Conference on Advancement of Science and Technology, ICAST 2018, which took place in Bahir Dar, Ethiopia, in October 2018.
This book constitutes the refereed proceedings of the First International Conference on Big Scientific Data Management, BigSDM 2018, held in Beijing, Greece, in November/December 2018.
This book identifies and explains the different national approaches to data protection - the legal regulation of the collection, storage, transmission and use of information concerning identified or identifiable individuals - and determines the extent to which they could be harmonised in the foreseeable future.
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.
This book constitutes the proceedings of the 20th International Conference on Passive and Active Measurement, PAM 2019, held in Puerto Varas, Chile, in March 2019.
Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule.
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team programLeverage the homefield advantage to stay ahead of your adversariesUnderstand core adversarial tactics and techniques, and protect pentesters and pentesting assetsBook DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches.
Learn the foundations of blockchain technology - its core concepts and algorithmic solutions across cryptography, peer-to-peer technology, and game theory.
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of EthereumKey FeaturesBuild end-to-end decentralized Ethereum apps using Truffle, Web3, and SolidityExplore various solution-based recipes to build smart contracts and foolproof decentralized applicationsDevelop decentralized marketplaces from scratch, build wallets, and manage transactionsBook DescriptionEthereum and Blockchain will change the way software is built for business transactions.
A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifactsKey FeaturesGet up and running with modern mobile forensic strategies and techniquesAnalyze the most popular Android applications using free and open source forensic toolsLearn malware detection and analysis techniques to investigate mobile cybersecurity incidentsBook DescriptionMany forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of these jobs perfectly.
Key FeaturesGain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tacticsLearn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategiesA practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your systemBook DescriptionThe book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations.
Conduct repeatable, defensible investigations with EnCase Forensic v7Maximize the powerful tools and features of the industry-leading digital investigation software.
Secure today's mobile devices and applicationsImplement a systematic approach to security in your mobile application development with help from this practical guide.
Implement and Maintain Rock-Solid Security for Oracle E-Business SuiteSecure Oracle E-Business Suite within organizations and across the Internet using the in-depth guidance of this comprehensive volume.
Critical infrastructure sectors are those whose assets, systems, and networks, whether physical or virtual, are deemed so important to nations that their incapacitation or destruction would have a crippling effect on national security, national economic security, national public health or safety, or any combination of these.
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 provides an overview of live and postmortem response collection and analysis methodologies for Windows 7.
Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe.
Understand what the emerging global information security law means for your businessIn today s business environment, our dependence on information technology and an interconnected information infrastructure to create, use, communicate and store key records has significant economic benefits.
Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems.
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective.