The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017.
This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017.
This book provides expert advice on the practical implementation of the European Union's General Data Protection Regulation (GDPR) and systematically analyses its various provisions.
This book constitutes the refereed proceedings of the 12th Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2017, held in Jeju Island, South Korea, in May 2017 in conjunction with PAKDD 2017, the 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining.
This Brief presents the overarching framework in which each nation is developing its own cyber-security policy, and the unique position adopted by France.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.
This volume presents analyses of data protection systems and of 26 jurisdictions with data protection legislation in Africa, as well as additional selected countries without comprehensive data protection laws.
This book describes pragmatic instruments and methods that enable business experts and software engineers to develop a common understanding of the software to be created, to determine their key requirements, and to manage the project in a way that fosters trust, encourages innovation and distributes risk fairly between clients and contractors.
This book presents groundbreaking discussions on e-residency,cryptocurrencies, scams, smart contracts, 3D printing, software agents, digitalevidence and e-governance at the intersection of law, legal policies and moderntechnologies.
Theinformation infrastructure---comprising computers, embedded devices, networksand software systems---is vital to day-to-day operations in every sector:information and telecommunications, banking and finance, energy, chemicals andhazardous materials, agriculture, food, water, public health, emergencyservices, transportation, postal and shipping, government and defense.
This book constitutes the refereed proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2015, held in Seoul, South Korea, in October 2015.
This book discusses the main legal questions raised by free and open source software (FOSS) licenses and other alternative license models, such as Creative Commons.
This book constitutes the refereed proceedings of the 6th International Conference on E-Technologies, MCETECH 2015, held in Montreal, Canada, in May 2015.
The ever increasing use of computers, networks and the Internet has led to the need for regulation in the fields of cybercrime, cybersecurity and national security.
This book starts with an exercise, proposing a theoretical reflection on the technological path that, over time, has transformed the ways we produce, consume and manage intellectual content subject to copyright protection.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2013, held in September 2013 in Moscow, Russia.
Gives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge.
This work is an assessment of how to manage risk in property transactions in the context of the move from paper-based to electronic conveyancing (eConveyancing).
The views of leading researchers on the emerging topic of post-mortem digital legacy and posthumous interaction are explored in this book which combines the technical, cultural and legal aspects associated with this new branch of HCI.
This book stems from the CyberBRICS project, which is the first major attempt to produce a comparative analysis of Internet regulations in the BRICS countries - namely, Brazil, Russia, India, China, and South Africa.