This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020, held in Cairo, Egypt, in July 2020.
Facilitated by developments in technologies, the non-consensual posting of sexually explicit images of someone else for revenge, entertainment or political motive - so-called revenge porn - has become a global phenomenon.
This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020.
This two-volume set LNCS 10305 and LNCS 10306 constitutes the refereed proceedings of the 15th International Work-Conference on Artificial Neural Networks, IWANN 2019, held at Gran Canaria, Spain, in June 2019.
This book argues that security and defense have never been true priorities in the European Union, and have constantly been marginalized by the elites since the Soviet Union collapsed and the Warsaw Pact disintegrated.
Design, develop, and deploy innovative forensic solutions using PythonKey FeaturesDiscover how to develop Python scripts for effective digital forensic analysisMaster the skills of parsing complex data structures with Python librariesSolve forensic challenges through the development of practical Python scriptsBook DescriptionDigital forensics plays an integral role in solving complex cybercrimes and helping organizations make sense of cybersecurity incidents.
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.
This book constitutes the proceedings of the 6th International Conference on Electronic Voting, E-Vote-ID 2021, held online -due to COVID -19- in Bregenz, Austria, in October 2021.
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020.
This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017.
Este volumen se propone abordar, desde el derecho del consumidor, el tratamiento jurídico de la particular situación de vulnerabilidad de los usuarios frente a las tecnologías de la información y la comunicación (TICs), puesta de manifiesto con mayor evidencia durante la pandemia causada por el coronavirus.
Build a blue team for efficient cyber threat management in your organizationKey FeaturesExplore blue team operations and understand how to detect, prevent, and respond to threatsDive deep into the intricacies of risk assessment and threat managementLearn about governance, compliance, regulations, and other best practices for blue team implementationBook DescriptionWe've reached a point where all organizational data is connected through some network.
The Pragmatic Guide to Driving Value and Disrupting Markets with Blockchain "e;Blockchain's potential to transform businesses has generated a tremendous amount of excitement across industries.
This book critically assesses legal frameworks involving the bulk processing of personal data, initially collected by the private sector, to predict and prevent crime through advanced profiling technologies.
Biomedical research data sets are becoming larger and more complex, and computing capabilities are expanding to enable transformative scientific results.
Whether you call it the third wave, the information revolution, or the virtually connected world, the implications of a global information network are profound.
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations.
Whether you call it the third wave, the information revolution, or the virtually connected world, the implications of a global information network are profound.
Digital health encompasses a broad array of tools and strategies with the goals of advancing research, increasing health care access and quality, and making care more personalized.
Understand what the emerging global information security law means for your businessIn today s business environment, our dependence on information technology and an interconnected information infrastructure to create, use, communicate and store key records has significant economic benefits.
Das Problem der fragmentierten IT Sicherheit: Informationssicherheit und deren Normen und Standards (BSI Grundschutz, ISO27001, weitere) sowie IT-Sicherheit (Technik und Betrieb) sollen zukünftig besser verzahnen.
This report reviews Federal Communications Commission order FCC 20-48, which authorized Ligado Networks LLC to operate a low-power terrestrial radio network adjacent to the Global Positioning System (GPS) frequency band.
With the increasing use of e-learning, technology has not only revolutionized the way businesses operate but has also impacted learning processes in the education sector.