In the digital finance world, cybersecurity and cloud tools can be used to prevent attacks and secure sensitive information such as the data of business transactions, internal payments, interbank payments, bank accounts, loan and deposit accounts, stocks, and other financial transactions.
Securing Health: The Convergence of AI and Cybersecurity in Healthcare explores how emerging technologies are revolutionizing modern medicine, ensuring not just innovation but safety and trust in the digital age.
Posthuman Social Science and Computational Culture offers theoretical and practical insight into posthuman social science research methods, addressing new challenges in computational culture.
While the Industrial Internet of Things (IIoT) and Wireless Sensor Networks (WSNs) continue to redefine industrial infrastructure, the need for proactive, intelligent, and scalable cybersecurity solutions has never been more pressing.
This book offers a comprehensive guide to navigating the transformation of the workforce due to the influence of artificial intelligence (AI) across industries and discusses detailed strategies for executing reskilling and upskilling programs for professionals and managers in charge of workforce development, training, and employee retention in an AI-driven landscape.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
The second edition of this bestselling book provides an in-depth explanation of not only why we fall for scams and how fraudsters use technology and other techniques to manipulate others but also why fraud prevention advice is not always effective.
This book constitutes the refereed proceedings of the 7th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 27th International Conference, HCI International 2025, in Gothenburg, Sweden, during June 22–27, 2025.
This book constitutes the refereed proceedings of the 7th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 27th International Conference, HCI International 2025, in Gothenburg, Sweden, during June 22–27, 2025.
This book constitutes the refereed proceedings of the 7th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 27th International Conference, HCI International 2025, in Gothenburg, Sweden, during June 22–27, 2025.
This book constitutes the refereed proceedings of the 7th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 27th International Conference, HCI International 2025, in Gothenburg, Sweden, during June 22–27, 2025.
'Reasonable expectations of privacy' have become a cornerstone concept in privacy and data protection legislation worldwide, extending today from US constitutional law to the GDPR, Article 8 ECHR, and various Asian and African data protection frameworks.
This book is a practical guide to be used by people with little or no knowledge of sustainability as well as sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted by different organizations, successfully.
This book provides a comprehensive exploration of the security challenges and solutions with digital sustainability in the rapidly evolving digital landscape of digital forensics.
This book provides a comprehensive exploration of the security challenges and solutions with digital sustainability in the rapidly evolving digital landscape of digital forensics.
This newly updated edition presents a global perspective on ergonomics, addressing its application across occupational, recreational, design, and technological environments.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
This textbook presents an overview of the critically important ethical and legal issues that arise in the computing field and provides a professional perspective from software engineering.
This textbook presents an overview of the critically important ethical and legal issues that arise in the computing field and provides a professional perspective from software engineering.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024, held in Gardanne, France, during April 9-10, 2024.
In an age of rapid technological progress and digital transformation, the convergence of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security.
This book offers a comprehensive guide to navigating the transformation of the workforce due to the influence of artificial intelligence (AI) across industries and discusses detailed strategies for executing reskilling and upskilling programs for professionals and managers in charge of workforce development, training, and employee retention in an AI-driven landscape.
This book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023, held in Munich, Germany, during April 3-4, 2023.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019.