This book is a collection of best-selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2024), held at Jalpaiguri Government Engineering College (JGEC), Jalpaiguri, West Bengal, India, during March 6-8, 2024.
Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology.
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents.
A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems.
In this essential, Martin Pils unfolds a clear vision for effective security awareness programs aimed at strengthening the human element in cyber defense.
In this essential, Martin Pils unfolds a clear vision for effective security awareness programs aimed at strengthening the human element in cyber defense.
The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes.
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing.
The conference on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresss between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest results as well as to review the relevant issues on
The Certified Information Security Manager(CISM) certification program was developed by the Information Systems Audit and Controls Association (ISACA).
Guide to Optimal Operational Risk and Basel II presents the key aspects of operational risk management that are also aligned with the Basel II requirements.
The book presents select proceedings of the 3rd International Conference on "e;Artificial-Business Analytics, Quantum and Machine Learning: Trends, Perspectives, and Prospects"e; (Com-IT-Con 2023) held at the Manav Rachna University in July 2023.
The book presents select proceedings of the 3rd International Conference on "e;Artificial-Business Analytics, Quantum and Machine Learning: Trends, Perspectives, and Prospects"e; (Com-IT-Con 2023) held at the Manav Rachna University in July 2023.
Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured.
This volume offers a concise overview of cyber warfare, providing historical context and an examination of its rapid development into a potent technological weapon of the 21st century.
This volume assembles hundreds of cases and studies to provide the most accurate and comprehensive picture of the status of pornography in the criminal justice system.
A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text.
This book is based on the best papers accepted for presentation during the AISMA-2024: International Workshop on Advanced in Information Security Management and Applications.
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment.
This book is based on the best papers accepted for presentation during the AISMA-2024: International Workshop on Advanced in Information Security Management and Applications.