Blockchain technology is a disruptive technology that affords businesspeople an opportunity to correct problems of dishonesty, corruption, and poor decision-making.
This concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures walks readers through a series of examples, discussions, tables, initiative figures, and diagrams to present to them security and privacy foundations and applications.
This book contains the conference proceedings of ICABCS 2023, a non-profit conference with the objective to provide a platform that allows academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence, Blockchain, Computing and Security.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2023), held at Vidyasagar University, Midnapore, India, during March 24-26, 2023.
Auf Grund des langanhaltenden Niedrigzinsniveaus sowie der zusätzlichen Herausforderungen der Corona-Pandemie, stehen Anbieter von Finanzdienstleistungsberatungen (z.
This book contains the conference proceedings of ICABCS 2023, a non-profit conference with the objective to provide a platform that allows academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence, Blockchain, Computing and Security.
This book contains the conference proceedings of ICABCS 2023, a non-profit conference with the objective to provide a platform that allows academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence, Blockchain, Computing and Security.
In einer Welt, in der KI-Technologien rasch fortschreiten und Datenschutzfragen immer wichtiger werden, bietet dieses Buch wertvolle Einblicke und praktische Lösungen.
This book explores the intersection of cybersecurity and education technologies, providing practical solutions, detection techniques, and mitigation strategies to ensure a secure and protected learning environment in the face of evolving cyber threats.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
This book explores the intersection of cybersecurity and education technologies, providing practical solutions, detection techniques, and mitigation strategies to ensure a secure and protected learning environment in the face of evolving cyber threats.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
Take your penetration testing career to the next level by discovering how to set up and exploit cost-effective hacking lab environments on AWS, Azure, and GCPKey FeaturesExplore strategies for managing the complexity, cost, and security of running labs in the cloudUnlock the power of infrastructure as code and generative AI when building complex lab environmentsLearn how to build pentesting labs that mimic modern environments on AWS, Azure, and GCPPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe significant increase in the number of cloud-related threats and issues has led to a surge in the demand for cloud security professionals.
Digital Forensic Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements, Second Edition provides a one-stop shop for a set of procedures that meet international best practices and standards for handling digital evidence during its complete lifecycle.
This book shares new methodologies, technologies, and practices for resolving issues associated with leveraging AI-centric modeling, data analytics, machine learning-aided models, Internet of Things-driven applications, and cybersecurity techniques in the era of Industrial Revolution 4.
This book shares new methodologies, technologies, and practices for resolving issues associated with leveraging AI-centric modeling, data analytics, machine learning-aided models, Internet of Things-driven applications, and cybersecurity techniques in the era of Industrial Revolution 4.
With the increase in the development of the advanced cellular communication system, it is assumed that several sectors, such as the health industry, education, transport industry, business model, and so on, will rapidly grow.
Because of the growing reliance on software, concerns are growing as to how reliable a system is before it is commissioned for use, how high the level of reliability is in the system, and how many vulnerabilities exist in the system before its operationalization.
Because of the growing reliance on software, concerns are growing as to how reliable a system is before it is commissioned for use, how high the level of reliability is in the system, and how many vulnerabilities exist in the system before its operationalization.
With the increase in the development of the advanced cellular communication system, it is assumed that several sectors, such as the health industry, education, transport industry, business model, and so on, will rapidly grow.
The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects.
The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects.
This book focuses on artificial intelligence (AI) and machine learning (ML) technologies and how they are progressively being incorporated into a wide range of products, including consumer gadgets, "e;smart"e; personal assistants, cutting-edge medical diagnostic systems, and quantum computing systems.
In this updated edition, the security threat landscape has widened and the challenge for CISOs to be more than just security coordinators has become a mandate for organizational survival.
In this updated edition, the security threat landscape has widened and the challenge for CISOs to be more than just security coordinators has become a mandate for organizational survival.
This textbook analyses the origins and effects of insider risk, using multiple real-life case histories to illustrate the principles, and explains how to protect organisations against the risk.
This textbook analyses the origins and effects of insider risk, using multiple real-life case histories to illustrate the principles, and explains how to protect organisations against the risk.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems.
A quick, easy-to-read synthesis of theory, guidelines, and evidence-based research, this book offers timely, practical guidance for library and information professionals who must navigate ethical crises in information privacy and stay on top of emerging privacy trends.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 - 18 December 2022.