A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile element of information security-humansPeople-Centric Security: Transforming Your Enterprise Security Culture addresses the urgent need for change at the intersection of people and security.
From school lunchrooms to the White House press room, video games are an integral part of our popular culture, and the industry behind them touches all aspects of our lives, gamer and non-gamer alike.
Aimed at addressing the difficulties associated with teaching often abstract elements of technical ethics, this book is an extended fictional case study into the complexities of technology and social structures in complex organizations.
The New York Times and USA Today bestseller-updated to bring you up to speed on the latest social media sites, features, and strategiesFrom one of the world's leading figures in social media marketing, networking, and business applications comes the heavily revised and updated edition of the Likeable Social Media.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.
This bookconstitutes the refereed proceedings of the Second International Symposium onCyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015.
This bookconstitutes the refereed proceedings of the Third European Conference onInformation Literacy, ECIL 2015, held in Tallinn, Estonia, in October 2015.
This book constitutes the refereed proceedings of the Third EAI International Conference on Smart Objects and Technologies for Social Good, GOODTECHS 2017, held in Pisa, Italy, November 29-30, 2017.
This book constitutes the proceedings of the 19th International Conference on Passive and Active Measurement, PAM 2018, held in Berlin, Germany, in March 2018.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018.
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018.
The four-volume set LNCS 11334-11337 constitutes the proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018.
Since the discovery of electromagnetic waves less than 150 years ago, the application of wireless communications technology has not only revolutionized our daily lives, but also fundamentally changed the course of world history.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Serious Games, Interaction and Simulation, SGAMES 2016, held in Porto, Portugal, in June 2016.
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019.
This book constitutes the refereed proceedings of the 6th International Conference on Advances in Visual Informatics, IVIC 2019, held in Bangi, Malaysia, in November 2019.
This book constitutes the proceedings of the First International Conference on Science of Cyber Security, SciSec 2018, held in Beijing, China, in August 2018.
This book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018.
Es ist für Fachleute wie Laien immer wieder überraschend, wie die Errungenschaften der Informatik das Leben der Menschen verbessern können, manchmal sogar in Richtungen, welche die Menschen gar nicht unbedingt wünschen.
This book constitutes the refereed proceedings of the 13th International Conference on Persuasive Technology, PERSUASIVE 2018, held in Waterloo, ON, Canada, in April 2018.
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.
This volume constitutes the proceedings of the 11th International Conference on Augmented Cognition, AC 2017, held as part of the International Conference on Human-Computer Interaction, HCII 2017, which took place in Vancouver, BC, Canada, in July 2017.
This book constitutes the refereed proceedings of the 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14 2020, which was supposed take place in Tokyo, Japan, in September 2020, but the conference was cancelled due to the COVID-19 crisis.
In einer Welt, in der immer mehr Fake News verbreitet werden, wird es zunehmend schwieriger, Wahrheit und Lüge, Wissen und Meinung auseinanderzuhalten.
This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017.
This book constitutes the proceedings of the 14th International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2017, held in Vancouver, Canada, in July 2017.
This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017.