This book constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011.
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, is about finding tradeoffs to the tension between the increasing societal need for accurate statistical data and the legal and ethical obligation to protect privacy of individuals and enterprises which are the source of data for producing statistics.
Moving Target Defense (MTD) has been proposed as an innovative defense framework, which aims to introduce the dynamics, diversity and randomization into static network by the shuffling, heterogeneity and redundancy.
Privacy in statistical databases is a discipline whose purpose is to provide so- tionstothetensionbetweenthesocial,political,economicandcorporatedemand for accurate information, and the legal and ethical obligation to protect the p- vacy of the various parties involved.
Pro Azure Governance and Security will be an indispensable guide for IT professionals, cloud architects, and security engineers aiming to master the latest governance and security practices within Microsoft Azure.
Without a solid, robust procedure to evaluate digital asset investments, decisions are often made based on hype or influencer reviews, which, in the end, is nothing short of a lottery ticket.
Pro Azure Governance and Security will be an indispensable guide for IT professionals, cloud architects, and security engineers aiming to master the latest governance and security practices within Microsoft Azure.
This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009.
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
The two-volume set LNCS 16223 + 16224 constitutes the refereed proceedings of the 16th International Conference on Decision and Game Theory for Security, GameSec 2025, which took place in Athens, Greece, in October 2025.
The two-volume set LNCS 16223 + 16224 constitutes the refereed proceedings of the 16th International Conference on Decision and Game Theory for Security, GameSec 2025, which took place in Athens, Greece, in October 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
The two-volume set LNCS 16223 + 16224 constitutes the refereed proceedings of the 16th International Conference on Decision and Game Theory for Security, GameSec 2025, which took place in Athens, Greece, in October 2025.
The two-volume set LNCS 16223 + 16224 constitutes the refereed proceedings of the 16th International Conference on Decision and Game Theory for Security, GameSec 2025, which took place in Athens, Greece, in October 2025.
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22–24, 2025.
This book constitutes the refereed proceedings of the Second EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2024, held in Dubai, United Arab Emirates, during December 9–10, 2024.
This book constitutes the refereed proceedings of the Second EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2024, held in Dubai, United Arab Emirates, during December 9–10, 2024.
This book constitutes the proceedings of the 21st International Workshop on Security and Trust Management, STM 2025, held in conjunction with the 30th European Symposium on Computer Security Research (ESORICS 2025), in Toulouse, France, during September 25–26, 2025.
This book constitutes the proceedings of the 21st International Workshop on Security and Trust Management, STM 2025, held in conjunction with the 30th European Symposium on Computer Security Research (ESORICS 2025), in Toulouse, France, during September 25–26, 2025.
This book deals with the tension between law and technology of data protection topic, to propose a novel approach for interpreting personal data protection audit.
This book deals with the tension between law and technology of data protection topic, to propose a novel approach for interpreting personal data protection audit.
This book contains best selected research papers presented at ICTCS 2024: Ninth International Conference on Information and Communication Technology for Competitive Strategies.
This book contains best selected research papers presented at ICTCS 2024: Ninth International Conference on Information and Communication Technology for Competitive Strategies.
This book contains best selected research papers presented at ICTCS 2024: Ninth International Conference on Information and Communication Technology for Competitive Strategies.
This book contains best selected research papers presented at ICTCS 2024: Ninth International Conference on Information and Communication Technology for Competitive Strategies.
This book contains best selected research papers presented at ICTCS 2024: Ninth International Conference on Information and Communication Technology for Competitive Strategies.
This book contains best selected research papers presented at ICTCS 2024: Ninth International Conference on Information and Communication Technology for Competitive Strategies.
This book contains best selected research papers presented at ICTCS 2024: Ninth International Conference on Information and Communication Technology for Competitive Strategies.
This book contains best selected research papers presented at ICTCS 2024: Ninth International Conference on Information and Communication Technology for Competitive Strategies.
This book offers a practical and in-depth exploration of Open Source Intelligence (OSINT) tailored for cybersecurity professionals, digital investigators, and threat analysts.
This book offers a practical and in-depth exploration of Open Source Intelligence (OSINT) tailored for cybersecurity professionals, digital investigators, and threat analysts.
As organizations are still attempting to figure out how to navigate AI risks, compliance, and governance, The Definitive Guide to Responsible AI is a timely guide to help set the foundation for responsible and trustworthy AI use.
As organizations are still attempting to figure out how to navigate AI risks, compliance, and governance, The Definitive Guide to Responsible AI is a timely guide to help set the foundation for responsible and trustworthy AI use.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.