This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022.
We are at the threshold of a new area of the internet that promises to transform the way we engage financially and take the power of data and privacy back from big corporations and give it to the individual through decentralization.
Master designing, developing, and operating secure infrastructures on Google cloudKey FeaturesPrepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for building a secure and compliant cloud environmentExplore advanced concepts like Security Command Center, BeyondCorp Zero Trust, and container securityBook DescriptionGoogle Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments.
This book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022.
This book constitutes the refereed proceedings of the 8th Iberoamerican Workshop on Human-Computer Interaction, HCI-COLLAB 2022, which took place in Havana, Cuba, in October 2022.
This book constitutes the refereed proceedings of the 11th International Conference on Cloud Computing and Services Science, CLOSER 2021, Virtual Event, during April 28-30, 2021.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022.
This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection.
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data.
Demystify one of the most disruptive modern technologies and gain a deeper understanding of distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, and more.
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26-30, 2022.
This book constitutes the revised selected proceedings of Second International Symposium on Biomedical and Computational Biology, BECB 2022, held as a virtual event in August 2022.
Although cryptography plays an essential part in most modern solutions, especially in payments, cryptographic algorithms remain a black box for most users of these tools.
Blockchain and Digital Twin Applications in Smart Agriculture presents scenarios, solutions, applications to optimize crop management, improve resource allocation, and enhance sustainability in modern farming practices.
This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud.
This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud.
The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations.
Explore the entire Hyperledger blockchain family, including frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and tools such as Composer, Explorer, and Caliper.
Build distributed applications that resolve data ownership issues when working with transactions between multiple partiesKey FeaturesExplore a perfect balance between theories and hands-on activitiesDiscover popular Blockchain use cases such as BitcoinCreate your first smart contract in Solidity for EthereumBook DescriptionBlockchain applications provide a single-shared ledger to eliminate trust issues involving multiple stakeholders.
Integrate an end-to-end logistic chain using IBM Blockchain and IoT platformsKey FeaturesExplore practical implementation of ledger technology in the IoT architectureStudy security best practices for your smart devicesUnderstand Blockchain implementation for end-to-end IoT solutionsBook DescriptionBlockchain has been the hot topic of late thanks to cryptocurrencies.
Best practices for protecting critical data and systemsInformation Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures.
Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide.
From the #1 Name in Professional CertificationPrepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.
Written by the #1 name in IT security certification training, fully revised for the latest exam release, and featuring 750+ practice questions plus 24 hours of audio lecturesCISSP Practice Exams, Second Edition is the ideal companion to Shon Harris bestselling CISSP All-in-One Exam Guide.
Learn quick and effective techniques for developing blockchain-based distributed ledgers with easeKey FeaturesDiscover why blockchain is a game changer in the technology landscapeSet up blockchain networks using Hyperledger FabricWrite smart contracts at speed with Hyperledger ComposerBook DescriptionBlockchain and Hyperledger are open source technologies that power the development of decentralized applications.
Explore the blockchain-based decentralized platform and understand how Ethereum works with Dapps examplesKey FeaturesExplore the Ethereum ecosystem and understand the latest research on the platformBuild decentralized apps (Dapps) using smart contracts and Ethereum with the help of practical examplesLearn to make your decentralized applications fast and highly secureBook DescriptionEthereum is a blockchain-based, decentralized computing platform that allows running smart contracts.
Build real-world projects like a smart contract deployment platform, betting apps, wallet services, and much more using blockchainKey FeaturesApply blockchain principles and features for making your life and business betterUnderstand Ethereum for smart contracts and DApp deploymentTackle current and future challenges and problems relating to blockchainBook DescriptionBlockchain applications provide a single-shared ledger to eliminate trust issues involving multiple stakeholders.
Understand how blockchain works and explore a variety of strategies to implement it in your organization effectivelyKey FeaturesBecome familiar with business challenges faced by companies when using blockchainDiscover how companies implement blockchain to monetize and secure their dataStudy real-world examples to understand blockchain and its use in organizationsBook DescriptionIn addition to cryptocurrencies, blockchain-based apps are being developed in different industries such as banking, supply chain, and healthcare to achieve digital transformation and enhance user experience.
This two-volume set constitutes the proceedings of the Third Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2019, held in Volgograd, Russia, in September 2019.
This book constitutes the proceedings of the 18th International Conference on Information Technologies and Mathematical Modelling, ITMM 2019, named after A.
This book constitutes the revised and extended papers of the First International Conference on Innovations in Digital Economy, SPBU IDE 2019, held in St.
This book constitutes the refereed post-conference proceedings of the IFIP TC 3 Open Conference on Computers in Education, OCCE 2020, held in Mumbai, India, in January 2020.
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.