This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
The two-volume set LNCS 16223 + 16224 constitutes the refereed proceedings of the 16th International Conference on Decision and Game Theory for Security, GameSec 2025, which took place in Athens, Greece, in October 2025.
The two-volume set LNCS 16223 + 16224 constitutes the refereed proceedings of the 16th International Conference on Decision and Game Theory for Security, GameSec 2025, which took place in Athens, Greece, in October 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This book constitutes the refereed proceedings of the Second EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2024, held in Dubai, United Arab Emirates, during December 9–10, 2024.
This book constitutes the refereed proceedings of the Second EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2024, held in Dubai, United Arab Emirates, during December 9–10, 2024.
This book constitutes the proceedings of the 21st International Workshop on Security and Trust Management, STM 2025, held in conjunction with the 30th European Symposium on Computer Security Research (ESORICS 2025), in Toulouse, France, during September 25–26, 2025.
This book constitutes the proceedings of the 21st International Workshop on Security and Trust Management, STM 2025, held in conjunction with the 30th European Symposium on Computer Security Research (ESORICS 2025), in Toulouse, France, during September 25–26, 2025.
This book deals with the tension between law and technology of data protection topic, to propose a novel approach for interpreting personal data protection audit.
This book deals with the tension between law and technology of data protection topic, to propose a novel approach for interpreting personal data protection audit.
This book offers a practical and in-depth exploration of Open Source Intelligence (OSINT) tailored for cybersecurity professionals, digital investigators, and threat analysts.
This book offers a practical and in-depth exploration of Open Source Intelligence (OSINT) tailored for cybersecurity professionals, digital investigators, and threat analysts.
As organizations are still attempting to figure out how to navigate AI risks, compliance, and governance, The Definitive Guide to Responsible AI is a timely guide to help set the foundation for responsible and trustworthy AI use.
As organizations are still attempting to figure out how to navigate AI risks, compliance, and governance, The Definitive Guide to Responsible AI is a timely guide to help set the foundation for responsible and trustworthy AI use.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This book provides a comprehensive exploration of the engineering and scientific principles behind the Metaverse, a 3D digital world designed to replicate and enhance physical reality through some advanced technologies, such as extended reality (xR), artificial intelligence (AI), blockchain, 5G/6G, and computer vision.
This book provides a comprehensive exploration of the engineering and scientific principles behind the Metaverse, a 3D digital world designed to replicate and enhance physical reality through some advanced technologies, such as extended reality (xR), artificial intelligence (AI), blockchain, 5G/6G, and computer vision.
Dieses Lehrbuch prasentiert umfassend die Grundlagen der Kryptographie, beginnend mit symmetrischen Verfahren zur Sicherung von Vertraulichkeit, Integritat und Authentizitat bis hin zu aktuellen Public-Key-Verfahren und Post-Quantum-Kryptographie.
Dieses Lehrbuch prasentiert umfassend die Grundlagen der Kryptographie, beginnend mit symmetrischen Verfahren zur Sicherung von Vertraulichkeit, Integritat und Authentizitat bis hin zu aktuellen Public-Key-Verfahren und Post-Quantum-Kryptographie.
Schluss mit Passwortsalat und standigen Zurucksetzen-Mails: Dieses praxisnahe Handbuch fuhrt Sie Schritt fur Schritt vom klassischen Login zur modernen Anmeldung mit Passkeys-schnell, sicher und ohne Technikfrust.
This book systematically addresses the security and resilience of networked agent systems, from sensor networks to general multi-agent systems, against evolving cyber threats.
This book presents a case study of the development of a smart contract, from the analysis of the legal contract to the structural design of the smart contract and implementation on the Ethereum blockchain.
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape.
This book presents a case study of the development of a smart contract, from the analysis of the legal contract to the structural design of the smart contract and implementation on the Ethereum blockchain.
This book lays a systematic foundation for professionals, researchers, and industry readers who are interested the applications and implications of generative AI for cybersecurity.
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape.
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025.