In a world where machines learn, evolve, and sometimes outthink us, Artificial Intelligence and Safety offers a rare, integrated lens into both the power and peril of intelligent systems.
In a world where machines learn, evolve, and sometimes outthink us, Artificial Intelligence and Safety offers a rare, integrated lens into both the power and peril of intelligent systems.
This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.
This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.
Enterprising the Internet has been a process over the past years and while this book does not set judgement, it does call for a moment of pause and reflection on the impact of these technologies to individuals.
Intelligent and Secure Solutions for Digital Transformation offers a comprehensive exploration of cutting-edge technologies and methodologies at the intersection of cybersecurity and digital innovation.
Intelligent and Secure Solutions for Digital Transformation offers a comprehensive exploration of cutting-edge technologies and methodologies at the intersection of cybersecurity and digital innovation.
This book investigates the complex ethical dilemmas underpinning AI regulation, analysing the EU Artificial Intelligence Act in the context of the fundamental values and ambitious expectations that have accompanied it initially.
This book provides a comprehensive overview of cybersecurity management in ports, cybersecurity vulnerabilities, and managerial strategies to improve cyber resilience.
This book explores Internet of Medical Things (IoMT) security and privacy in electronic healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks.
This book explores Internet of Medical Things (IoMT) security and privacy in electronic healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks.
This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025.
This book investigates the complex ethical dilemmas underpinning AI regulation, analysing the EU Artificial Intelligence Act in the context of the fundamental values and ambitious expectations that have accompanied it initially.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.
This book constitutes the refereed proceedings of the 10th International Conference, EGOV 2011, held in Delft, The Netherlands, in August/September 2011.
This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held in Torino, Italy, in August/September 2008 within the DEXA 2008 conference cluster.
This book provides a comprehensive overview of cybersecurity management in ports, cybersecurity vulnerabilities, and managerial strategies to improve cyber resilience.
Enterprising the Internet has been a process over the past years and while this book does not set judgement, it does call for a moment of pause and reflection on the impact of these technologies to individuals.
This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025.
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.
This book introduces the concept of Technical Normative Power (TNP) to explain how the European Union (EU) transforms internal legal frameworks into external influence.
This book introduces foundational and advanced concepts in artificial intelligence (AI) and machine learning (ML), focusing on their real-world applications and societal implications.
This second edition of The Digital Humanities Coursebook provides critical frameworks for the application of digital humanities tools and platforms, which have become an integral part of work across a wide range of disciplines.
Artificial Intelligence (AI) has become part and parcel of many aspects of our lives, impacting how we approach tasks and understand the world around us.
Cybernetic Shield: Securing the Future of Machine Intelligence explores the critical intersection between cybersecurity and the rapid advancements in artificial intelligence.
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation.