Recommended textbook for the Open University's postgraduate information security course and the recommended text for all IBITGQ ISO 27001 coursesIn this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins:Discuss the ISO 27001/27002:2022 updates;Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002;Highlight why data protection and information security are vital in our ever-changing online and physical environments;Reflect on changes to international legislation, e.
This book includes selected papers from the International Conference on Data Science and Intelligent Applications (ICDSIA 2020), hosted by Gandhinagar Institute of Technology (GIT), Gujarat, India, on January 24-25, 2020.
Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworksKey FeaturesGain insights into the latest antivirus evasion techniquesSet up a complete pentesting environment using Metasploit and virtual machinesDiscover a variety of tools and techniques that can be used with Kali LinuxBook DescriptionPenetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system.
This book provides an in-depth study on the theory of fundamental rights and the legal challenges posed by new technologies, with a particular focus on neurotechnologies and neurorights.
This book provides an in-depth study on the theory of fundamental rights and the legal challenges posed by new technologies, with a particular focus on neurotechnologies and neurorights.
The aim of this book is to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to AI risks, as AI systems often require access to personal data.
This book aims to provide a comprehensive overview of the applications of Artificial Intelligence (AI) in the area of Cybersecurity and Digital Forensics.
By the time you finish reading this, your business could be a victim of one of the hundreds of cyber attacks that are likely to have occured in businesses just like yours.
Esta publicación pretende reforzar la necesidad de definir estrategias para preservar los sistemas propios de los países (especialmente los datos), dada la dificultad de prevenir ataques cibernéticos e identificar sus fuentes.
Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms and protocols for secret and reliable communication.
The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology.
Watermarking techniques involve the concealment of information within a text or images and the transmission of this information to the receiver with minimum distortion.
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet.
The explosive increase in information and the miniaturization of electronic devices demand new recording technologies and materials that combine high density, fast response, long retention time and rewriting capability.
The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous.
This book sets the stage of the evolution of corporate governance, laws and regulations, other forms of governance, and the interaction between data governance and other corporate governance sub-disciplines.
This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing.
This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC.
This book provides basics and selected advanced insights on how to generate reliability, safety and resilience within (socio) technical system developments.
This book explores recent advances in the Internet of things (IoT) via advanced technologies and provides an overview of most aspects which are relevant for advance secure, distributed, decentralized blockchain technology in the Internet of things, their applications, and industry IoT.
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers.
This book provides a comprehensive introduction to quantum image processing, which focuses on extending conventional image processing tasks to the quantum computing frameworks.
This book introduces readers to the fundamentals of and recent advances in federated learning, focusing on reducing communication costs, improving computational efficiency, and enhancing the security level.
This book focuses on development of blockchain-based new-generation financial infrastructures, in which a systematic, complete theoretical framework is proposed to explore blockchain-based securities trading platform, central securities depository (CSD), securities settlement system (SSS), central counterparty (CCP), payment system (PS) and trade repository (TR).
This book gathers selected papers presented at the International Conference on Innovations in Information and Communication Technologies (ICIICT 2022), held in Thailand during April 15-16, 2022.
This book highlights the design, use and structure of blockchain systems and decentralized ledger technologies (B/DLT) for use in the construction industry.
This book presents best selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2022), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus, India, during 11 - 12 February 2022.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India-Kolkata Chapter, India, during December 2-4, 2021.
This book highlights the latest advances on the implementation and adaptation of blockchain technologies in real-world scientific, biomedical, and data applications.
This book highlights future research directions and latent solutions by integrating AI and Blockchain 6G networks, comprising computation efficiency, algorithms robustness, hardware development and energy management.
This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention.
Blockchain is an emerging technology platform for developing decentralized applications and data storage, over and beyond its role as the technology underlying the cryptocurrencies.
This book includes selected papers from the International Conference on Next Generation of Internet of Things (ICNGIoT 2022), organized by Department of Computer Science and Engineering, School of Engineering, GIET University, Gunupur, Odisha, India, during February 3-4, 2022.
The book presents high-quality, peer-reviewed papers from the FICR International Conference on Rising Threats in Expert Applications and Solutions 2022 organized by IIS (Deemed to be University), Jaipur, Rajasthan, India, during January 7-8, 2022.
This second volume in this set of books discusses various sustainable approaches in textiles and the fashion sector with a focus on consumerism and the supply chain.