This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method.
This book contains revised selected papers from the 28th International Conference on Selected Areas in Cryptography, SAC 2021, held as a virtual event September and October 2021.
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India-Kolkata Chapter, India, during December 2-4, 2021.
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022.
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021.
This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2022), organized during September 09-11, 2022, in Thailand in online mode.
This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2021, held in Kolkata, India, in December 2021.
This book constitutes the proceedings of the 28th International Conference on Web Services, ICWS 2021, held virtually as part of SCF 2021, during December 10-14, 2021.
This book gathers selected papers presented at the International Conference on Innovations in Information and Communication Technologies (ICIICT 2022), held in Thailand during April 15-16, 2022.
This book constitutes the refereed proceedings of the 9th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2021, held in San Antonio, TX, USA, in 2021.
This fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP examThoroughly revised for the 2022 edition of the exam, this highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge.
The book is a collection of best selected research papers presented at the International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications (ICMISC 2022) held during 28 - 29 March 2022 at CMR Institute of Technology, Hyderabad, Telangana, India.
This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security.
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26-30, 2022.
In an increasingly interconnected and digital world, this book provides comprehensive guidance on cybersecurity leadership specifically tailored to the context of public policy and administration in the Global South.
This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performance Engineering, EPEW 2022, held in Santa Pola, Spain, in September 2022.
Artificial intelligence (AI), machine learning, and advanced electronic circuits involve learning from every data input and using those inputs to generate new rules for future business analytics.
This book offers an alternative for encrypting and decrypting messages using objects called integer and fractional-order estimators or observers, by means of security codes.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods.
This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2022, held in Chengdu, China, in August - September 2022.
This book includes the proceedings of the International Conference on Emerging Trends in IoT and Computing Technologies (ICEICT-2022) held at Goel Institute of Technology & Management, Lucknow, India.
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "e;what"e; but also addressing the "e;why"e; behind China's focus on establishing information dominance as a key component of its military efforts.
This book includes the proceedings of the International Conference on Emerging Trends in IoT and Computing Technologies (ICEICT-2022) held at Goel Institute of Technology & Management, Lucknow, India.
Die Einführung des Buches legt den Grundstein für die nachfolgenden Kapitel, indem sie die Definitionen und Grundlagen der Wirtschaftskriminalität klärt und ein solides Verständnis für die Dimensionen und die Tragweite dieser Herausforderung schafft.
This book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise.
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity examTake the Certified in Cybersecurity exam from (ISC)2 with confidence using the information contained in this comprehensive study guide.
Moderne Kryptografie kompetent vermittelt- Lehrbuch Basiswissen IT-Sicherheit- Relevante kryptografische Techniken- Blockchain und Post-Quantum-KryptografieDie Kryptografie ist die wesentliche Grundlage der IT-Sicherheit.
Moderne Kryptografie kompetent vermittelt- Lehrbuch Basiswissen IT-Sicherheit- Relevante kryptografische Techniken- Blockchain und Post-Quantum-KryptografieDie Kryptografie ist die wesentliche Grundlage der IT-Sicherheit.
This book contains best selected research papers presented at ICTCS 2022: Seventh International Conference on Information and Communication Technology for Competitive Strategies.