Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerabil......more
...more
...more
"Today’s organizations must be prepared for tomorrow’s events. Forecast future behavior in SAP Analytics Cloud with this......more
This book constitutes the refereed conference proceedings of the second International Conference on Speech and Language ......more
...more
Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving a......more
This book contains selected papers presented at the 18th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer Scho......more
This book constitutes the referred proceedings of the 5th International Conference on Machine Learning for Cyber Securit......more
This book constitutes the referred proceedings of the 9th Iberoamerican Workshop on Human-Computer Interaction, HCI-COLL......more
...more
...more
This book constitutes the refereed proceedings of the First EAI International Conference on Safe, Secure, Ethical, Respo......more
The two-volume set CCIS 2061 and 2062 constitutes the refereed post-conference proceedings of the 18th International Con......more
This book contains visionary and best papers from the workshops held at the International Conference on Autonomous Agent......more
This volume constitutes the refereed proceedings of the Second International Conference on Computing, Communication and ......more
This book constitutes the proceedings of the 21st International Conference on Comparative Genomics, RECOMB-CG 2024, whic......more
The two-volume set CCIS 2061 and 2062 constitutes the refereed post-conference proceedings of the 18th International Con......more
This book constitutes revised selected papers from the workshops held at the 29th International Conference on Parallel a......more
...more
The two-volume set CCIS 2053 and 2054 constitutes the refereed post-conference proceedings of the 13th International Adv......more
This book constitutes revised selected papers from the workshops held at the 29th International Conference on Parallel a......more
Learn how to set up zero-cost security automation, incident response, file integrity monitoring systems, and cloud secur......more
This book constitutes the refereed post-conference proceedings the 19th International Conference on Persuasive Technolog......more
This book focuses on and prioritizes a practical approach, minimizing theoretical concepts to deliver algorithms effecti......more
This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust ......more
...more
Discover the future of cybersecurity with "AI and ML Applications for Decision-Making on Zero Trust Cyber Security: Volu......more
APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensive resource providing ......more
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm ......more
...more
...more
...more
Are you ready to challenge the ways you have always approached networking? The IT world has undergone a transformation, ......more
It is a question of observing the diversity of content on taxonomy and its existing construction methods, according to t......more
Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense agai......more
Master ChatGPT and the OpenAI API and harness the power of cutting-edge generative AI and large language models to revol......more
The aim of this study was to understand and analyze the new forms of sociability on the Internet, through a deeper under......more
In 2006, the Signal Processing Department at Blekinge Institute of Technology and Axiom EduTECH in Sweden worked with Na......more
The two-volume set CCIS 2053 and 2054 constitutes the refereed post-conference proceedings of the 13th International Adv......more
This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigb......more
Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspe......more
This monograph presents a comprehensive exploration of Reverse Engineering of Deceptions (RED) in the field of adversari......more
There has been an increase in cybercrime and a search for government or private company assets that have failed security......more
...more
Embark on a transformative journey to becoming a cloud solution architect with a roadmap, expert insights, and practical......more
...more
...more
An analysis of adolescents’ representations and uses of computers connected to the Internet, understanding them as recip......more
This book constitutes the refereed proceedings of the 31st International Conference on Inductive Logic Programming, ILP ......more
As one of the core equipments and actuators, robotic technology has attracted much attention and has made great progress......more
...more
This book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present......more
Artificial Intelligence for Cyber Defence and Smart Policing will describe the best way of practising artificial intelli......more
This proceedings presents the papers included in the 2nd International Congress of Electrical and Computer Engineering (......more
On 12 October 2022, the EDPB (European Data Protection Board) endorsed the Europrivacy(TM)/(R) certification scheme. Thi......more
This CCIS post conference volume constitutes the proceedings of First Workshop, SUNRISE 2023, in Stavanger, Norway, in N......more
In ’Connected through Chaos: Telecommunications Resilience Strategies’, Anshul Yadav, a telecom professional, unveils a ......more
Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, a......more
This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the ......more
This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the ......more
This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the ......more
This book constitutes the proceedings of the 26th RoboCup International Symposium which was held in Bordeaux, France, du......more
...more
Get ready to master Microsoft Intune and revolutionize your endpoint management strategy with this comprehensive guide a......more
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity ......more
This LNCS conference volume constitutes the proceedings of the 20th International Symposium, ARC 2024, in Aveiro, Portug......more
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops whi......more
If you are worried about falling victim to cyber threats and having your sensitive data compromised, then keep reading........more
In the mid-2010s, a passionate community of Los Angeles-based storytellers, media artists, and tech innovators formed ar......more
In the mid-2010s, a passionate community of Los Angeles-based storytellers, media artists, and tech innovators formed ar......more
Tackle advanced platform security challenges with this practical Moodle guide complete with expert tips and techniquesKe......more
...more
Shurick Agapitov’s Once Upon Tomorrow unpacks the sometimes vague concept of the metaverse and shares the opportunities ......more
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies. Book Description Embark on ......more
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops whi......more
The 7-volume set LNCS 14487-14493 constitutes the proceedings of the 23rd International Conference on Algorithms and Arc......more
The 7-volume set LNCS 14487-14493 constitutes the proceedings of the 23rd International Conference on Algorithms and Arc......more
The 7-volume set LNCS 14487-14493 constitutes the proceedings of the 23rd International Conference on Algorithms and Arc......more
The Metaverse and Smart Cities: Urban Environments in the Age of Digital Connectivity explores the intersection between ......more
Shaping a World of Respect: Guarding the Innocence of Youth Embark on a transformative journey with "Smart Boundaries: S......more
"Mastering the Maze: Navigate to Success with Google Ads" is your ultimate guide to harnessing the power of Google Ads t......more
This book provides for a deeper insight into the Data Mining Techniques used in the present day scenario in almost all f......more
This book is an essential guide to IPv6 network slicing. It covers both the fundamentals and cutting-edge technologies o......more
Gain both a firm practical understanding and sufficient theoretical insight into the inner workings of Linux kernel inte......more
...more
Publicly available information (PAI) is a critical form of information for use in military operations. Multiple agencies......more
The PCI DSS (Payment Card Industry Data Security Standard) is now on its fourth version. The withdrawal date for v3.2.1 ......more
The 7-volume set LNCS 14487-14493 constitutes the proceedings of the 23rd International Conference on Algorithms and Arc......more
The 7-volume set LNCS 14487-14493 constitutes the proceedings of the 23rd International Conference on Algorithms and Arc......more
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security......more
5G and Beyond Wireless Networks: Technology, Network Deployments, and Materials for Antenna Design offers a comprehensiv......more
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Inf......more
"Embracing the Fog: Harnessing the Power of Mist Computing," the book explores the concept of mist computing, also known......more
The book "Foggy Horizons: Unraveling the Potential of Fog Computing" provides a comprehensive exploration of fog computi......more
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Inf......more