The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023.
In today's digital transformation environments, a rigorous cybersecurity approach to effective risk management - including contingency planning, outlining immediate actions, preparing post-breach responses - is central to defending organizations' interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.
This book presents an examination of the relationship between finance, investment, and digital transformation in the context of Asian business environment.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This edited collection provides the reader with a comprehensive knowledge of automated decision-making, artificial intelligence (AI), and algorithms, and how they can be used in criminal proceedings.
Digital Strategy and Governance in Transformative Technologies offers a comprehensive exploration of how emerging technologies are reshaping business operations, governance structures, and societal interactions.
The book provides a comprehensive overview of biometrics, including its theoretical foundations and practical applications, and offers valuable insights into its relevance and impact on various sectors of society.
The book provides a comprehensive overview of biometrics, including its theoretical foundations and practical applications, and offers valuable insights into its relevance and impact on various sectors of society.
Explore reverse engineering in Armv8-A-based Arm devices, develop the skills to analyze binaries, and leverage cutting-edge security hardening features through hands-on techniques and expert insightsKey FeaturesMaster key aspects of Armv8-A, including register, exception handling, and TrustZoneBuild new reversing skills for kernel binaries, such as *.
This book presents best-selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2024), hosted by Christ (Deemed to be University), India, and technically sponsored by The Tejas Scientific Researcher Foundation, India, from 08–09 November, 2024.
This book presents best-selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2024), hosted by Christ (Deemed to be University), India, and technically sponsored by The Tejas Scientific Researcher Foundation, India, from 08–09 November, 2024.
Artificial Intelligence (AI) has revolutionized several sectors, with digital forensics being one that has been notably affected by its rapid advancement.
This book provides a comprehensive guide to the principles and engineering approaches necessary for developing secure and sustainable blockchain applications.
This book provides a comprehensive guide to the principles and engineering approaches necessary for developing secure and sustainable blockchain applications.
Tabletop exercises are a common way to test disaster recovery and business continuity plans, but they can also be some of the most dry and boring meetings any professional can attend.
In einer Welt, in der technologische Lösungen das menschliche Vertrauen zunehmend ersetzen, stellt sich eine drängende Frage: Was passiert mit dem sozialen Gefüge, wenn Algorithmen über Beziehungen entscheiden?