This book constitutes the refereed proceedings of the 19th International Conference on Network and System Security, NSS 2025, held in Wuhan, China, during December 5–7, 2025.
This book constitutes the refereed proceedings of the 19th International Conference on Network and System Security, NSS 2025, held in Wuhan, China, during December 5–7, 2025.
This book offers a comprehensive roadmap for securing modern digital supply chains by weaving together foundational theory, organizational strategy, and advanced technologies.
This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 1–2, 2025.
This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 1–2, 2025.
This book constitutes the proceedings of the 15th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2025, held in Guwahati, India, during December 16–19, 2025.
This book constitutes the proceedings of the 15th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2025, held in Guwahati, India, during December 16–19, 2025.
This book presents the best papers from the 6th International Conference on Mathematical Research for Blockchain Economy (MARBLE) 2025, held in Athens, Greece.
This book offers a comprehensive roadmap for securing modern digital supply chains by weaving together foundational theory, organizational strategy, and advanced technologies.
“Blockchain-based Web of Things Security: Advances, Challenges, and Solutions” offers a concise yet comprehensive exploration of how blockchain technologies can enhance the security and trustworthiness of the Web of Things (WoT).
This research examines the adoption of blockchain technology in pharmaceutical supply chains, focusing on the barriers that prevent most initiatives from moving beyond the pilot stage.
This research examines the adoption of blockchain technology in pharmaceutical supply chains, focusing on the barriers that prevent most initiatives from moving beyond the pilot stage.
This book constitutes the revised selected papers of the 21st European Workshop on Computer Performance Engineering, EPEW 2025, held in Catania, Italy, on June 26, 2025.
This book constitutes the revised selected papers of the 21st European Workshop on Computer Performance Engineering, EPEW 2025, held in Catania, Italy, on June 26, 2025.
This book presents the best papers from the 6th International Conference on Mathematical Research for Blockchain Economy (MARBLE) 2025, held in Athens, Greece.
Build a modern security intelligence program with Sumo Logic that combines DevSecOps practices, Cloud SIEM insights, and automation to detect, investigate, and respond faster while ensuring complianceFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesMaster essential skills for security monitoring and analytics using Sumo LogicPerform advanced threat hunting using Cloud SIEM in Sumo LogicGet up to speed quickly and easily with this practical guide for security analystsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionModernize your security operations with Sumo Logic s Continuous Intelligence Platform that delivers real-time detection, analysis, and response to threats, and find out how it enables security teams to unify monitoring, apply advanced analytics, and strengthen defenses across diverse environments.
This book, structured as an edited volume, consists of 12 chapters organized into four key themes: Theoretical Foundations, Human Factors, Application Domains, and Future Challenges.
This comprehensive collection presents cutting-edge research at the intersection of cybersecurity, artificial intelligence, and emerging technologies for critical infrastructure protection.
“Blockchain-based Web of Things Security: Advances, Challenges, and Solutions” offers a concise yet comprehensive exploration of how blockchain technologies can enhance the security and trustworthiness of the Web of Things (WoT).
Build a modern security intelligence program with Sumo Logic that combines DevSecOps practices, Cloud SIEM insights, and automation to detect, investigate, and respond faster while ensuring complianceFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesMaster essential skills for security monitoring and analytics using Sumo LogicPerform advanced threat hunting using Cloud SIEM in Sumo LogicGet up to speed quickly and easily with this practical guide for security analystsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionModernize your security operations with Sumo Logic s Continuous Intelligence Platform that delivers real-time detection, analysis, and response to threats, and find out how it enables security teams to unify monitoring, apply advanced analytics, and strengthen defenses across diverse environments.
This book, structured as an edited volume, consists of 12 chapters organized into four key themes: Theoretical Foundations, Human Factors, Application Domains, and Future Challenges.
This comprehensive collection presents cutting-edge research at the intersection of cybersecurity, artificial intelligence, and emerging technologies for critical infrastructure protection.
The Silent Hands: Navigating the World of Hidden Cyber Forces takes readers on a journey into the shadowy world of rootkits, privilege escalation, and the silent attackers that manipulate systems we rely on.
As the deployment of AI technologies surges, the need to safeguard privacy and security in the use of large language models (LLMs) is more crucial than ever.
As the deployment of AI technologies surges, the need to safeguard privacy and security in the use of large language models (LLMs) is more crucial than ever.
This book provides a comprehensive exploration of how artificial intelligence (AI) is revolutionizing cyber risk management, offering advanced methodologies to identify, assess, quantify, and mitigate threats effectively.