In today's fast-paced digital landscape, organizations face an ever-increasing volume of data that holds immense potential for driving business success.
The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle.
With the recent debacle surrounding the cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of grasping the security and regulation of Web3, cryptocurrency, and blockchain projects has been magnified.
Master advanced computer security and encryption techniques with this comprehensive guide covering cryptography, IPSEC, VPNs, and emerging technologies.
This book is aimed at a diverse audience including students, researchers, academicians, cybersecurity professionals, IT managers, Metaverse developers, business leaders, policymakers, and tech enthusiasts.
From AI ethics and cybersecurity to augmented realities, virtual interfaces, and much more, Futureshock provides an accessible introduction to the leading edge topics of today.
A trustworthy repository provides assurance in the form of management documents, event logs, and audit trails that digital objects are being managed correctly.
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner.
Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety.
The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities.
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing.
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved.
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc.
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.
Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings.
Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time.
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication.
Understanding Victimology: An Active Learning Approach is the only textbook with extensive discussion of both online and offline victimization reinforced by group and individual learning activities.
Understanding Victimology: An Active Learning Approach is the only textbook with extensive discussion of both online and offline victimization reinforced by group and individual learning activities.
Master network security and cryptography with this in-depth guide covering essential concepts, techniques, and advanced topics for protecting data and networks.
"e;What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code.