A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based.
This book is a collection of peer-reviewed best selected research papers presented at the Fifth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2024), organized by the School of Electronics and Engineering, VIT - AP University, Amaravati, Andhra Pradesh, India, during January 5-6, 2024.
This book is a collection of peer-reviewed best selected research papers presented at the Fifth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2024), organized by the School of Electronics and Engineering, VIT - AP University, Amaravati, Andhra Pradesh, India, during January 5-6, 2024.
Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System is a non-technical explanation of online offences by a cybersecurity expert, bridging the gap between the high-tech world of cybercrime and the non-technical professionals working within it.
This book features selected papers from the 10th International Conference on Mathematics and Computing (ICMC 2024), held at Kalasalingam Academy of Research and Education (KARE), Krishnankoil, India during 2 - 7 January 2024.
This book features selected papers from the 10th International Conference on Mathematics and Computing (ICMC 2024), held at Kalasalingam Academy of Research and Education (KARE), Krishnankoil, India during 2 - 7 January 2024.
The book offers a critical exploration of the integration of AI, blockchain, and metaverse technology in the hospitality and tourism industry to investigate the potential of these technologies in revolutionizing the industry.
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program.
A comprehensive guide to understanding and implementing database security, covering essential topics such as threats, controls, encryption, and data integrity.
Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis.
Data-driven marketing is a huge aspect of any modern-day marketing plan, but balancing customers' privacy concerns with the latest innovations can be a complex challenge.
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program.
This innovative resource provides comprehensive coverage of the policies, practices, and guidelines needed to address the security issues related to today's wireless sensor networks, satellite services, mobile e-services, and inter-system roaming and interconnecting systems.
The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its beginnings to modern uses.
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system.
Artificial Intelligence in Forensic Science addresses the current and emerging opportunities being utilized to apply modern Artificial Intelligence (AI) technologies to current forensic and investigation practices.
This textbook introduces the fundamental concepts and techniques used in biometric recognition to students, practitioners, and non-experts in the field.
Over the past three years, the landscape of blockchain technology has undergone remarkable transformation, extending far beyond its association with cryptocurrencies especially with the emergence of Web3 applications.
This book contains original, peer-reviewed research articles from the 5th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications, held in Hyderabad, India on 28-29 March 2024.
Reflecting the diverse and specialized nature of the security industry, this volume provides an up-to-date treatment of a topic that has become increasingly complex as more vulnerabilities arise.
Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack.
Ambient assisted living (AAL) utilizes information and communication technology to empower individuals to maintain an active and independent lifestyle for as long as possible.
Offering a holistic view of the pioneering trends and innovations in smart healthcare management, this book focuses on the methodologies, frameworks, design issues, tools, architectures, and technologies necessary to develop and understand intelligent healthcare systems and emerging applications in the present era.