Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems.
Phishing for Nazis is an evidence-based, undercover study of neo-Nazi communities on anonymous communication platforms that helps to shine a light on the dark web.
As design continues to impact our products, services, and solutions at scale, it is more important than ever to understand the systems and context that surround design decisions.
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security.
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy.
This book provides a comprehensive and in-depth exploration of decentralized insurance, its impact on the insurance sector, its ethical implications, and its potential to transform the insurance industry.
Lossless Information Hiding in Images introduces many state-of-the-art lossless hiding schemes, most of which come from the authors' publications in the past five years.
The IT/Digital Legal Companion is a comprehensive business and legal guidance covering intellectual property for digital business; digital contract fundamentals; open source rules and strategies; development, consulting and outsourcing; software as a service; business software licensing, partnering, and distribution; web and Internet agreements; privacy on the Internet; digital multimedia content clearance and distribution; IT standards; video game development and content deals; international distribution; and user-created content, mash-ups, MMOGs, and web widgets.
Implement and Maintain Rock-Solid Security for Oracle E-Business SuiteSecure Oracle E-Business Suite within organizations and across the Internet using the in-depth guidance of this comprehensive volume.
Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection.
This book explores the integration of Artificial Intelligence (AI) across areas such as IoT, big data, healthcare, business, economics, and security, and improving the quality of life (QoL) in smart cities today.
This volume constitutes the refereed proceedings of the 10th International Conference on Multimedia Communications, Services and Security, MCSS 2020, held in Krakow, Poland, in October 2020.
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security.
Das vorliegende Lehrbuch richtet sich an alle, die die Prüfung zur Schutz- und Sicherheitskraft vor einer Industrie- und Handelskammer ablegen wollen, und eignet sich zugleich als Nachschlagewerk für die Praxis sowie zur regelmäßigen Weiterbildung.
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.
This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends such as quantum, blockchain, lightweight, Chaotic and DNA cryptography.
This book constitutes the refereed proceedings of the 7th International Conference on E-Democracy, E-Democracy 2017, held in Athens, Greece, in December 2017.
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
This book constitutes thoroughly reviewed, revised and selected papers from the 4th International Conference on Human Centered Computing, HCC 2018, held in Merida, Mexico, in December 2018.
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018.
This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016.
In this book, the protection of personal data is compared for eight EU member states,namely France, Germany, the United Kingdom, Ireland, Romania, Italy, Sweden andthe Netherlands.
This book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021.
This book presents state-of-the-art methodologies and a comprehensive introduction to the recognition and representation of species and individual animals based on their physiological and phenotypic appearances, biometric characteristics, and morphological image patterns.
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020, held in Cairo, Egypt, in July 2020.
Facilitated by developments in technologies, the non-consensual posting of sexually explicit images of someone else for revenge, entertainment or political motive - so-called revenge porn - has become a global phenomenon.
This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020.
This two-volume set LNCS 10305 and LNCS 10306 constitutes the refereed proceedings of the 15th International Work-Conference on Artificial Neural Networks, IWANN 2019, held at Gran Canaria, Spain, in June 2019.
This book argues that security and defense have never been true priorities in the European Union, and have constantly been marginalized by the elites since the Soviet Union collapsed and the Warsaw Pact disintegrated.
Design, develop, and deploy innovative forensic solutions using PythonKey FeaturesDiscover how to develop Python scripts for effective digital forensic analysisMaster the skills of parsing complex data structures with Python librariesSolve forensic challenges through the development of practical Python scriptsBook DescriptionDigital forensics plays an integral role in solving complex cybercrimes and helping organizations make sense of cybersecurity incidents.
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.
This book constitutes the proceedings of the 6th International Conference on Electronic Voting, E-Vote-ID 2021, held online -due to COVID -19- in Bregenz, Austria, in October 2021.
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020.