This book features peer-reviewed papers from the International Conference on Recent Developments in Cyber Security, organized by the Center for Cyber Security and Cryptology.
This book features peer-reviewed papers from the International Conference on Recent Developments in Cyber Security, organized by the Center for Cyber Security and Cryptology.
Mastering computer security requires more than just technical knowledge of software, systems and networks—it demands analytical thinking, a problem-solving mindset, and creative reasoning.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The book reviews the zero-trust model that deviates from the traditional definition of trust boundaries and validates all interactions in a cloud environment.
Mastering computer security requires more than just technical knowledge of software, systems and networks—it demands analytical thinking, a problem-solving mindset, and creative reasoning.
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative.
Securing Health: The Convergence of AI and Cybersecurity in Healthcare explores how emerging technologies are revolutionizing modern medicine, ensuring not just innovation but safety and trust in the digital age.
In the digital finance world, cybersecurity and cloud tools can be used to prevent attacks and secure sensitive information such as the data of business transactions, internal payments, interbank payments, bank accounts, loan and deposit accounts, stocks, and other financial transactions.
Securing Health: The Convergence of AI and Cybersecurity in Healthcare explores how emerging technologies are revolutionizing modern medicine, ensuring not just innovation but safety and trust in the digital age.
Explore the evolving field of cybersecurity leadership and gain real-world insights from top security leaders on strategy, communication, and resilience to excel as a CISO in today's digital landscape.
While the Industrial Internet of Things (IIoT) and Wireless Sensor Networks (WSNs) continue to redefine industrial infrastructure, the need for proactive, intelligent, and scalable cybersecurity solutions has never been more pressing.
Unlock cybersecurity secrets and develop a hacker's mindset while building the high-demand skills used by elite hackers and defendersFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesGain an insider's view of cybersecurity roles and the real work they do every dayMake informed career decisions with clear, practical insights into whether cybersecurity is right for youBuild essential skills that keep you safe online, regardless of your career pathBook DescriptionIn today s increasingly connected world, cybersecurity touches every aspect of our lives, yet it remains a mystery to most.
Effective cyber resilience requires a culture of preparedness that considers risk management and recovery planning to be at least as important as cyber defences.
Effective cyber resilience requires a culture of preparedness that considers risk management and recovery planning to be at least as important as cyber defences.
This book constitutes the proceedings of the first World Conference of Computer and Information Security, WCCIS 2024, which was held in Kuala Lumpur, Malaysia, during September 20–22, 2024.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 17th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2024, which took place in Bucharest, Romania, in November 2024.
The Six-volume proceedings set CCIS 2473 and 2478 constitutes the refereed proceedings of the 9th International Conference on Computer Vision and Image Processing, CVIP 2024, held in Chennai, India, during December 19–21, 2024.
This book constitutes the proceedings of the first World Conference of Computer and Information Security, WCCIS 2024, which was held in Kuala Lumpur, Malaysia, during September 20–22, 2024.
The Six-volume proceedings set CCIS 2473 and 2478 constitutes the refereed proceedings of the 9th International Conference on Computer Vision and Image Processing, CVIP 2024, held in Chennai, India, during December 19–21, 2024.
The Six-volume proceedings set CCIS 2473 and 2478 constitutes the refereed proceedings of the 9th International Conference on Computer Vision and Image Processing, CVIP 2024, held in Chennai, India, during December 19–21, 2024.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 17th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2024, which took place in Bucharest, Romania, in November 2024.
This book is a compilation of high-quality scientific papers presented at the 6th International Conference on Computer & Communication Technologies (IC3T 2024).
The Six-volume proceedings set CCIS 2473 and 2478 constitutes the refereed proceedings of the 9th International Conference on Computer Vision and Image Processing, CVIP 2024, held in Chennai, India, during December 19–21, 2024.
This book is a compilation of high-quality scientific papers presented at the 6th International Conference on Computer & Communication Technologies (IC3T 2024).
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025.