Over the past three years, the landscape of blockchain technology has undergone remarkable transformation, extending far beyond its association with cryptocurrencies especially with the emergence of Web3 applications.
This book contains original, peer-reviewed research articles from the 5th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications, held in Hyderabad, India on 28-29 March 2024.
Reflecting the diverse and specialized nature of the security industry, this volume provides an up-to-date treatment of a topic that has become increasingly complex as more vulnerabilities arise.
Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack.
Ambient assisted living (AAL) utilizes information and communication technology to empower individuals to maintain an active and independent lifestyle for as long as possible.
Offering a holistic view of the pioneering trends and innovations in smart healthcare management, this book focuses on the methodologies, frameworks, design issues, tools, architectures, and technologies necessary to develop and understand intelligent healthcare systems and emerging applications in the present era.
Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language).
This book provides a thorough exploration of the intersection between gender-based healthcare disparities and the transformative potential of artificial intelligence (AI) and machine learning (ML).
Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices.
As we go about our day-to-day lives, digital information about who we are is gathered from all angles via biometric scans, passport applications, and, of course, social media.
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr.
Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.
This guide explains how to gain a handle on the vital aspects of data protection, offering a solid understanding of how data protection fits into various organizations.
In diesem essential entfaltet Martin Pils eine klare Vision für effektive Security-Awareness-Programme, die darauf abzielen, das menschliche Element in der Cyberabwehr zu stärken.
In diesem essential entfaltet Martin Pils eine klare Vision für effektive Security-Awareness-Programme, die darauf abzielen, das menschliche Element in der Cyberabwehr zu stärken.
Truly a practical work, this handbook offers a comprehensive roadmap for designing and implementing an effective information security program based on real world scenarios.
Embark on a journey to business evolution grounded in the real-world experiences and challenges faced by those at the forefront of the Web2 revolution.
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance.
Cyber warfare, a term that encompasses a wide range of computer-based attacks on targeted enemy states, has emerged as one of the most pressing national security concerns of the 21st century.
In an increasingly interconnected and digital world, this book provides comprehensive guidance on cybersecurity leadership specifically tailored to the context of public policy and administration in the Global South.
This book features selected papers from the 10th International Conference on Mathematics and Computing (ICMC 2024), held at Kalasalingam Academy of Research and Education (KARE), Krishnankoil, India during 2 - 7 January 2024.
Blockchain and distributed-ledger technologies enable new modes of communication, synchronization, and transfer of value with a broad impact on Internet of Things (IoT), Data Science, society, industry, commerce, and government.
This book presents best-selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2023), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus, India, from 02-04 November, 2023.
Network Optimization in Intelligent Internet of Things Applications: Principles and Challenges sheds light on the optimization methods that form the basis of effective communication between networked devices.
A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security.