This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2022), organized during September 09-11, 2022, in Thailand in online mode.
This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2021, held in Kolkata, India, in December 2021.
This book constitutes the proceedings of the 28th International Conference on Web Services, ICWS 2021, held virtually as part of SCF 2021, during December 10-14, 2021.
This book gathers selected papers presented at the International Conference on Innovations in Information and Communication Technologies (ICIICT 2022), held in Thailand during April 15-16, 2022.
This book constitutes the refereed proceedings of the 9th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2021, held in San Antonio, TX, USA, in 2021.
This fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP examThoroughly revised for the 2022 edition of the exam, this highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge.
The book is a collection of best selected research papers presented at the International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications (ICMISC 2022) held during 28 - 29 March 2022 at CMR Institute of Technology, Hyderabad, Telangana, India.
This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security.
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26-30, 2022.
In an increasingly interconnected and digital world, this book provides comprehensive guidance on cybersecurity leadership specifically tailored to the context of public policy and administration in the Global South.
This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performance Engineering, EPEW 2022, held in Santa Pola, Spain, in September 2022.
Artificial intelligence (AI), machine learning, and advanced electronic circuits involve learning from every data input and using those inputs to generate new rules for future business analytics.
This book offers an alternative for encrypting and decrypting messages using objects called integer and fractional-order estimators or observers, by means of security codes.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods.
This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2022, held in Chengdu, China, in August - September 2022.
This book includes the proceedings of the International Conference on Emerging Trends in IoT and Computing Technologies (ICEICT-2022) held at Goel Institute of Technology & Management, Lucknow, India.
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "e;what"e; but also addressing the "e;why"e; behind China's focus on establishing information dominance as a key component of its military efforts.
This book includes the proceedings of the International Conference on Emerging Trends in IoT and Computing Technologies (ICEICT-2022) held at Goel Institute of Technology & Management, Lucknow, India.
Die Einführung des Buches legt den Grundstein für die nachfolgenden Kapitel, indem sie die Definitionen und Grundlagen der Wirtschaftskriminalität klärt und ein solides Verständnis für die Dimensionen und die Tragweite dieser Herausforderung schafft.
This book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise.
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity examTake the Certified in Cybersecurity exam from (ISC)2 with confidence using the information contained in this comprehensive study guide.
Moderne Kryptografie kompetent vermittelt- Lehrbuch Basiswissen IT-Sicherheit- Relevante kryptografische Techniken- Blockchain und Post-Quantum-KryptografieDie Kryptografie ist die wesentliche Grundlage der IT-Sicherheit.
Moderne Kryptografie kompetent vermittelt- Lehrbuch Basiswissen IT-Sicherheit- Relevante kryptografische Techniken- Blockchain und Post-Quantum-KryptografieDie Kryptografie ist die wesentliche Grundlage der IT-Sicherheit.
This book contains best selected research papers presented at ICTCS 2022: Seventh International Conference on Information and Communication Technology for Competitive Strategies.
Linux Malware Incident Response is a "e;first look"e; at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents.
Linux Malware Incident Response is a "e;first look"e; at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents.