This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from ......more
Embark on a journey into the intersection of the metaverse and blockchain with Metaverse and Blockchain Use Cases and Ap......more
This unique compendium covers the core theory of quantum computation and deeply emphasizes the mathematical fundamentals......more
This unique compendium covers the core theory of quantum computation and deeply emphasizes the mathematical fundamentals......more
This Handbook aims to address the complex interconnections between two transitions that lie at the heart of societal tra......more
This book covers state-of-the-art topics in the multidisciplinary areas of Artificial Intelligence (AI) and advanced con......more
...more
How can you communicate cyber risk in a way that builds trust and drives impact? Communicating Cyber Risk is a practical......more
How can you communicate cyber risk in a way that builds trust and drives impact? Communicating Cyber Risk is a practical......more
The imperative to defend against cyber threats is a fact of life in the digital age. World governments, Silicon Valley, ......more
This unique compendium is based on the author’s teaching and research experiences. It covers the fundamental principles ......more
...more
Readers of all backgrounds will learn about cryptography’s role in protecting everyday digital interactions - from buyin......more
The book was inspired by the urgent need for advanced security methods that can keep pace with the increasingly complex ......more
Understand the future of a thriving research toolkit with this introduction to big data analytics In recent decades, big......more
Are you an experienced cloud security professional looking to upskill or take your career to the next level? The demand ......more
School Security: How to Build and Strengthen a School Safety Program, Third Edition emphasizes a proactive rather than r......more
Available open access digitally under CC-BY-NC-ND licence. What does it mean to live in a world where our most essential......more
The Basics of Digital Forensics, Third Edition provides a foundation for people new to the digital forensics field. This......more
In this book, the most important cryptographic algorithms, protocols and constructions of the last decades are explained......more
Symbiosis Institute of Management Studies (SIMS), Pune, organized its 15th Annual International Research Conference, SIM......more
Quantum Learning: Bridging Artificial Intelligence, Quantum Computing, and Data Science in Education explores the transf......more
...more
An eye-opening discussion of how to apply new blockchain technologies to realize our digital potential In Zero Knowledge......more
This surprisingly accessible book uses key math concepts and more than 500 short exercises to teach functional programmi......more
Quantum Learning: Bridging Artificial Intelligence, Quantum Computing, and Data Science in Education explores the transf......more
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. T......more
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. T......more
The Basics of Hacking and Penetration Testing, Third Edition serves as an introduction to the steps required to complete......more
A riveting account of major ransomware attacks and their devastating consequences, revealing how exposed we really are--......more
Free PDF and epub formats plus online reader with AI assistant. Cloud applications have special security requirements an......more
In the exploration of new frontiers in data-driven solutions, the potential of quantum-enhanced machine learning has bec......more
In the exploration of new frontiers in data-driven solutions, the potential of quantum-enhanced machine learning has bec......more
As computers and intelligent machines evolve at an unprecedented pace, the quest to replicate human intelligence in soft......more
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity......more
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity......more
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity......more
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity......more
A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-s......more
This book explores the multifaceted implications of technological innovation on legal systems, addressing how emerging t......more
This book explores how digital crime/cybercrime has been decisively reshaped by the emergence of the digital platform. O......more
This book explores how digital crime/cybercrime has been decisively reshaped by the emergence of the digital platform. O......more
This book explores the transformative potential of Quantum computing in artificial intelligence and its impact on variou......more
Quantum computing is a rapidly emerging technology that harnesses the laws of quantum mechanics to solve problems too co......more
This volume constitutes the proceedings of the 7th International Conference on Application Intelligence and Blockchain S......more
Quantum Computing for Multimedia Processing, Teleportation, and Secure Networks offers a comprehensive exploration of qu......more
Historically, cyber security was always a "poor relation" in the eyes of the majority of Boards and CEOs, considered inf......more
Historically, cyber security was always a "poor relation" in the eyes of the majority of Boards and CEOs, considered inf......more
The Handbook of Security, Quantum Computing, and Internet of Things explores the critical intersection of IoT, security,......more
Despite the increased adoption of serverless computing services around the world, a big gap still exists when it comes t......more
Healthcare cybersecurity has changed significantly over the past decade. A compliance-driven, checklist-based approach u......more
Healthcare cybersecurity has changed significantly over the past decade. A compliance-driven, checklist-based approach u......more
This book presents quantum mechanics from two of its most fundamental pillars, quantum interference and quantum entangle......more
This book presents quantum mechanics from two of its most fundamental pillars, quantum interference and quantum entangle......more
Understanding Blockchain in Construction: A Practical Guide is an essential resource that offers a comprehensive explora......more
Understanding Blockchain in Construction: A Practical Guide is an essential resource that offers a comprehensive explora......more
Defend your system against hardware-based security breaches by thinking like a hacker! With this guide, master the tools......more
A guide to using the Ghidra software reverse engineering tool suite. DANCE WITH THE DRAGON The result of more than a dec......more
An up-to-date exploration of how AI is transforming cybersecurity and how to implement AI in your organization’s cyber d......more
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools and offensive se......more
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools and offensive se......more
A comprehensive, hacker-written guide for security professionals looking to plan and implement real-world penetration te......more
This book presents fundamentals of quantum computing and Internet of Things (IoT). It covers many applications of quantu......more
This book provides a comprehensive exploration of how artificial intelligence (AI) is revolutionizing cyber risk managem......more
...more
Cybersecurity in the Big Data Era is a fascinating look at the invisible fight going on under our networked lives. In a ......more
This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoreti......more
This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoreti......more
This book delves into the fundamentals of steganography, the ancient art of hiding messages in plain sight. From the his......more
This book delves into the fundamentals of steganography, the ancient art of hiding messages in plain sight. From the his......more
Ransomware attacks are no longer a question of if--it’s a matter of when. With hackers increasingly targeting backup and......more
Quantum Cryptography and Annealing for Securing Industrial IoT explores cutting-edge quantum security strategies designe......more
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions th......more
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of tech......more
This volume explores cryptoeconomic theories shaping blockchain and its integration with AI in the modern redefinition o......more
This book presents the proceedings of the Communication Security and Information Processing Conference (CSIP 2024), whic......more
...more
Enables readers to understand the full lifecycle of adversarial machine learning (AML) and how AI models can be compromi......more
This book captures the intersection of strategic leadership, innovation, and cybersecurity, and is written for business ......more
...more
When high expectations do not always match the resources at your disposal, how can small Internal Audit teams make a sig......more
When high expectations do not always match the resources at your disposal, how can small Internal Audit teams make a sig......more
...more
In today’s rapidly evolving digital landscape, traditional security frameworks struggle to keep pace with increasingly s......more
This book offers a comprehensive exploration of distributed ledger technology (DLT) in communication. The book first del......more
This book surveys state-of-the-art research on adversarial robustness of quantum machine learning algorithms. Despite th......more
This two-volume set CCIS 2743 and 2744 constitutes the refereed proceedings of the 1st International Conference on Quant......more
This two-volume set CCIS 2743 and 2744 constitutes the refereed proceedings of the 1st International Conference on Quant......more
This book provides a thorough guide to Quantum Operations that closes the gap between quantum computing theory and pract......more
This book presents the best papers from the 6th International Conference on Mathematical Research for Blockchain Economy......more
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in......more
...more