This book presents the proceedings of the International Conference on Applied Cyber Security 2023 (ACS23), held in Dubai on the April 29, containing seven original contributions.
This book presents the proceedings of the International Conference on Applied Cyber Security 2023 (ACS23), held in Dubai on the April 29, containing seven original contributions.
Letom 2016 goda neizvestnye vylozhili v internet perepisku vysshih chinov Demokraticheskoj partii SSHA — i rossijskie hakery, predpolozhitel'no rabotayushchie na Kreml', momental'no prevratilis' v odin iz glavnyh syuzhetov mirovoj politiki.
This book presents high-quality, peer-reviewed papers from Fourth International Conference on Advanced Computational and Communication Paradigms (ICACCP 2023), organized by Department of Computer Science and Engineering (CSE), Sikkim Manipal Institute of Technology (SMIT), Sikkim, India, during February 16-18, 2023.
Bringing together cutting-edge theory and research that bridges academic disciplines from criminology and criminal justice, to developmental psychology, sociology, and political science, Thinking About Victimization offers an authoritative and refreshingly accessible overview of scholarship on the nature, sources, and consequences of victimization.
In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications.
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs).
This proceedings volume presents a selection of peer-reviewed contributions from the Second Non-Associative Algebras and Related Topics (NAART II) conference, which was held at the University of Coimbra, Portugal, from July 18-22, 2022.
Private entities, especially those critical to our nation's infrastructure, are responsible for assessing their individual risk and investing in technology to prevent breaches.
Passage of the European Data Protection Directive and other national laws have increased the need for companies and other entities to improve their data protection and privacy controls.
This proceedings volume presents a selection of peer-reviewed contributions from the Second Non-Associative Algebras and Related Topics (NAART II) conference, which was held at the University of Coimbra, Portugal, from July 18-22, 2022.
This book constitutes revised selected papers from the workshops that were affiliated with the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
This timely and compelling book presents a broad study of all key cyber security issues of the highest interest to government and business as well as their implications.
This book constitutes revised selected papers from the workshops that were affiliated with the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sourcesPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesUnderstand and analyze various modern cyber threats and attackers' techniquesGain in-depth knowledge of email security, Windows, firewall, proxy, WAF, and security solution logsExplore popular cyber threat intelligence platforms to investigate suspicious artifactsBook DescriptionEffective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques.
The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Analytics and Insights (ICDAI 2023), organized by Techno International, Kolkata, India, during May 11-13, 2023.
The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Analytics and Insights (ICDAI 2023), organized by Techno International, Kolkata, India, during May 11-13, 2023.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection.
In today's fast-paced digital landscape, organizations face an ever-increasing volume of data that holds immense potential for driving business success.
Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sourcesPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesUnderstand and analyze various modern cyber threats and attackers' techniquesGain in-depth knowledge of email security, Windows, firewall, proxy, WAF, and security solution logsExplore popular cyber threat intelligence platforms to investigate suspicious artifactsBook DescriptionEffective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection.
This book gathers high-quality research papers presented at the 3rd International Conference on Frontiers in Computing and Systems (COMSYS 2022) held at Indian Institute of Technology Ropar, Punjab, India, during December 19-21, 2022.
This book gathers high-quality research papers presented at the 3rd International Conference on Frontiers in Computing and Systems (COMSYS 2022) held at Indian Institute of Technology Ropar, Punjab, India, during December 19-21, 2022.