This open-access book is premised on the belief that understanding and protecting privacy requires a multidisciplinary a......more
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of ......more
This book constitutes the refereed proceedings of the 38th IFIP TC 11 International Conference on Information Security a......more
Elevate your organization’s cybersecurity posture by implementing proven strategies and best practices to stay ahead of ......more
Venture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infrastructureKey Features ......more
Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts through real-life examp......more
Break this code: QDOJHQ FRPPHQGHG WKH SHRSOH RI WKH ZLWK Hint for the reader: patriots and tiki torches FTW. Solution in......more
Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced featuresKey Features......more
Machine learning algorithms allow computers to learn without being explicitly programmed. Their application is now sprea......more
Understanding and employing cryptography has become central for securing virtually any digital application, whether user......more
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases ......more
In the relentless cyber war, understanding that every individual and organization is a target is crucial. In this book, ......more
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more
The Comprehensive Guide to Cybersecurity Careers is the definitive resource for aspiring and established cybersecurity p......more
This comprehensive guide provides professionals, hiring managers, and business leaders with essential strategies and ins......more
This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in......more
���� Become a Certified Penetration Tester! ���� Are you ready to level up your cybersecurity skills and become a certif......more
In a world consumed by information warfare, where the line between truth and deception becomes increasingly blurred, und......more
���� Get Ready to Ace Your Security+ Exam with the Ultimate Study Bundle! ���� Are you ready to take your cybersecurity ......more
In his second book with IT Governance Publishing, Richard Bingley’s Combatting Cyber Terrorism - A guide to understandin......more
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Confe......more
This book constitutes the refereed proceedings of the Cryptographer’s Track at the RSA Conference 2024, CT-RSA 2024, hel......more
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International......more
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International......more
The Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Draw......more
The era of data sovereignty has arrived and the world is transforming into a data-driven society. This book begins its d......more
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a......more
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a......more
This book offers a clear, easy-to-understand introduction to the core concepts of Web3 and blockchain technology, settin......more
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Confe......more
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerabil......more
Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulner......more
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersec......more
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersec......more
Save time, improve stability, and optimize program memory while building decentralized applications on a blockchain usin......more
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Confe......more
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Confe......more
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Confe......more
The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber s......more
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Confe......more
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Confe......more
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, priva......more
Learn how to implement, deploy, and manage blockchain solutions across AWS, Azure, and GCP with the help of hands-on lab......more
The ability to make both individuals and consumers more secure online and on computer networks is a crying need worldwid......more
Transformative Artificial Intelligence provides a comprehensive overview of the latest trends, challenges, applications,......more
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Securi......more
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Securi......more
This book constitutes the refereed post proceedings of the 22nd International Workshop on Digital Forensics and Watermar......more
This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-phy......more
The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by t......more
This book contains selected papers presented at the 18th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer Scho......more
This book explores the innovative concept of a knowledge cartridge dedicated to internal and territorial security, emplo......more
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based alg......more
Facial recognition technology is increasingly used for identity verification and identification, from aiding law enforce......more
Artificial intelligence (AI) depends on data. In sensitive domains - such as healthcare, security, finance, and many mor......more
In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management -- includ......more
...more
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more
This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis ......more
This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity E......more
The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implem......more
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Con......more
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Con......more
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Con......more
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International......more
In a world of escalating tensions and unpredictable adversaries, understanding the intricate workings of intelligence ga......more
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Con......more
This important text/reference presents a comprehensive guide to the field of computing and information security and assu......more
The story of white Australians born in this land before 1850; most were the children of convicts, had no access to land ......more
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-......more
This book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, ......more
...more
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and ......more
This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensiv......more
The book aims to present a multi-dimensional view on the blockchain-driven supply chain management and its linkage with ......more
Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving a......more
Today, machine learning algorithms are often distributed across multiple machines to leverage more computing power and m......more
This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more
Emergency managers and public safety professionals are more frequently being called on to address increasingly challengi......more
This book introduces some fundamentals of information and communication technology (ICT) and other current and future te......more
This 3-volume set, CCIS 2058-2060 constitutes the First International Conference, on Artificial Intelligence, IAIC 2023,......more
This book--consisting of four parts--brings forth a comprehensive evaluation of information and communication technologi......more
This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly bec......more
This book contributes to blockchain applications in food supply chain management from both theoretical and practical per......more
This reference volume consists of revised, edited, cross-referenced, and thematically organized selected articles from S......more
This book presents an up-to-date perspective on randomized response techniques (RRT). It discusses the most appropriate ......more
The two-volume proceedings constitutes the refereed proceedings of the 24th International Conference on Progress in Cryp......more
The two-volume proceedings constitutes the refereed proceedings of the 24th International Conference on Progress in Cryp......more
Take your blockchain and Web3 development skills to the next level by building real-world full-stack DeFi applications w......more
Master the art of configuring and securing Microsoft 365, emphasizing robust security and compliance features, and manag......more
Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense agai......more
Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implem......more
The financial sector is witnessing rapid technological innovations, leading to the emergence of Fintech (financial techn......more
Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehe......more
This textbook highlights a concise introduction to quantum mechanics in a readable and serious manner. Being readable, t......more
This book presents an overview of the blockchain-based Internet of Things systems, along with the opportunities, challen......more
Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecur......more