This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains while networking with the leading representatives, researchers and solution providers.
This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity.
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains while networking with the leading representatives, researchers and solution providers.
This book evidences the cyclical failures of online safety policy and challenge conventional policy and educational approaches to tackling online harms, and provide a robust argument for a critical, evidence-based approaches which align with the needs of those we claim to wish to protect.
This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals.
This book serves as a comprehensive guide for legal practitioners, providing a primer on digital forensic evidence and essential technological concepts.
This book explores the intersection of cybersecurity and psychology, examining the motivations and behaviours of cybersecurity professionals, employees, hackers, and cybercriminals.
This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals.
This book examines the international forums in which states develop cyber norms-"e;rules of the road"e; for how governments use information and communication technologies.
This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity.
This book serves as a comprehensive guide for legal practitioners, providing a primer on digital forensic evidence and essential technological concepts.
An ideal primer for anyone implementing a PIMS based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001.
En este documento analizamos las políticas de privacidad de 30 empresas con modelos de negocios basados en los datos en Colombia, e identificamos las prácticas que no han sido suficientemente contempladas por el régimen de datos personales actualmente aplicable a nuestro país.