Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
Cybernetic Shield: Securing the Future of Machine Intelligence explores the critical intersection between cybersecurity and the rapid advancements in artificial intelligence.
This book takes up the contentious issue of artificial intelligence (AI), and more specifically the evolving nature of AI-mindedness, as a legal entity in society.
This book introduces foundational and advanced concepts in artificial intelligence (AI) and machine learning (ML), focusing on their real-world applications and societal implications.
Artificial Intelligence (AI) has become part and parcel of many aspects of our lives, impacting how we approach tasks and understand the world around us.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation.
This book takes up the contentious issue of artificial intelligence (AI), and more specifically the evolving nature of AI-mindedness, as a legal entity in society.
This book introduces the concept of Technical Normative Power (TNP) to explain how the European Union (EU) transforms internal legal frameworks into external influence.
This second edition of The Digital Humanities Coursebook provides critical frameworks for the application of digital humanities tools and platforms, which have become an integral part of work across a wide range of disciplines.
This contributed volume brings together perspectives from computer science, law, and organizational practice, it’s a foundational resource in the growing literature on compliance of AI systems.
The monograph provides coverage of an extensive history of Western thought by distinguishing two kinds of ‘legal monsters’: those as objects of legal regulations, as well as those as a source of criticism.
The monograph provides coverage of an extensive history of Western thought by distinguishing two kinds of ‘legal monsters’: those as objects of legal regulations, as well as those as a source of criticism.
This contributed volume brings together perspectives from computer science, law, and organizational practice, it’s a foundational resource in the growing literature on compliance of AI systems.
The cyber infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
The cyber infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
This volume constitutes the refereed proceedings of the 6th International Conference on Multimedia Communications, Services and Security, MCSS 2013, held in Krakow, Poland, in June 2013.
This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols, SP 2009, held in Cambridge, UK, in April 2009.
This book constitutes the refereed proceedings of the 7th Security Research Conference, Future Security 2012, held in Bonn, Germany, in September 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST on Auctions, Market Mechanisms and Their Applications (AMMA 2011) held in New York, USA, August 22-23, 2011.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012).
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010.
This book constitutes the joint thoroughly refereed post-proceedings of The Modeling Social Media Workshop, MSM 2010 held in Toronto, Canada in June 2010 and the International Workshop on Mining Ubiquitous and Social Environments, MUSE 2010, held in Barcelona, Spain in September 2010.
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, held in Beijing, China, in July 2011.
This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates.
This book constitutes the proceedings of the nine workshops that were organized in conjunction with the Business Information Systems Conference, BIS 2009, taking place in Poznan, Poland, on April 27-29, 2009.
The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May 12, 2008 at the Hyatt Regency, New Brunswick, New Jersey, USA.
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009.
This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St.