This book is aimed at a diverse audience including students, researchers, academicians, cybersecurity professionals, IT managers, Metaverse developers, business leaders, policymakers, and tech enthusiasts.
From AI ethics and cybersecurity to augmented realities, virtual interfaces, and much more, Futureshock provides an accessible introduction to the leading edge topics of today.
A trustworthy repository provides assurance in the form of management documents, event logs, and audit trails that digital objects are being managed correctly.
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner.
Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety.
The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities.
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing.
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved.
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc.
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.
Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings.
Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time.
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication.
Understanding Victimology: An Active Learning Approach is the only textbook with extensive discussion of both online and offline victimization reinforced by group and individual learning activities.
Understanding Victimology: An Active Learning Approach is the only textbook with extensive discussion of both online and offline victimization reinforced by group and individual learning activities.
Master network security and cryptography with this in-depth guide covering essential concepts, techniques, and advanced topics for protecting data and networks.
"e;What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code.
AMERICAN DEMOCRACY IS AT RISKNo oneconservative or liberalshould be comfortable with a few Silicon Valleyoligarchs having a monopoly over the marketplace of ideas, and with it, democracy itself.
With the recent debacle surrounding the cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of grasping the security and regulation of Web3, cryptocurrency, and blockchain projects has been magnified.
Penetration Tester's Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply.
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies.
This book has unique features that set it apart from conventional books on the prevention of system failures in that it provides a method that views human activities from a meta-methodological perspective based upon an inter-disciplinary understanding of human activities.
Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets.
Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage.
This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat.