This book constitutes the refereed proceedings of the 4th International Conference on Big Data and Security, ICBDS 2022,......more
Change Management for Risk Professionals addresses a need in the marketplace for risk professionals to learn about chang......more
...more
...more
One data breach can close a small business before it even gets going. With all that is involved in starting a new busine......more
Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud com......more
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference o......more
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference o......more
This book covers major areas of device and data security and privacy related to the Internet of Things (IoT). It also pr......more
This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition to......more
...more
Blockchain technology provided a buzz-seeking opportunity for all industries to implement improved corporate procedures ......more
This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI......more
An exhilarating tour of humanity’s next great technological achievement--quantum computing--which may eventually unravel......more
Digital transformation, also known as Industry 4.0, Smart Industry, and Smart Manufacturing, is at the top of leaders’ a......more
This book constitutes the refereed proceedings of the 4th International Conference on Codes, Cryptology and Information ......more
M. Vennila is a researcher who delves into the world of quantum mechanics and its application to organic chemistry. Her ......more
...more
...more
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for dat......more
...more
Simple packet filters are becoming a thing of the past. Even the open-source domain is moving towards Next-Generation Fi......more
"Coyne examines urban living through the frame of cryptography, diving into the technologies, instruments, and processes......more
The crypto era has arrived, and business will never be the same. Real applications of crypto technology are growing expo......more
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems......more
This book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in ......more
This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Securi......more
"Centrality Routing and Blockchain Technologies in Distributed Networks" is an enlightening and comprehensive exploratio......more
Although cryptography plays an essential part in most modern solutions, especially in payments, cryptographic algorithms......more
This book advances an approach that combines the individual and the structural, systemic dimensions of data protection. ......more
...more
"This book explores a policy-based approach to applying Blockchains worldwide, introducing the features, advantages, and......more
"Quantum Information at both High and Low Energy Levels" is an engaging and informative book written by Dr. Nicholas Con......more
...more
...more
Supply chain management, often known as SCM, refers to the extensive variety of operations that are required to plan, mo......more
The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International ......more
The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International ......more
The transformation of green investment and climate finance by blockchain establishes the relationship between global eff......more
The transformation of green investment and climate finance by blockchain establishes the relationship between global eff......more
One-part Black history, one-part Black futurism "DeFi for the Diaspora" examines the history of money to underscore the ......more
Machine learning algorithms allow computers to learn without being explicitly programmed. Their application is now sprea......more
Ace the AZ 801 exam and master advanced Windows Server and Infrastructure-as-a-Service workload administration with this......more
The ability to make both individuals and consumers more secure online and on computer networks is a crying need worldwid......more
The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles, Rick Howard, the Chie......more
"The objective is to publish both disciplinary, multidisciplinary and interdisciplinary works on questions related to ex......more
In 2023, cloud-native architecture has become the de facto standard for modern applications. But beyond the velocity and......more
This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments. The a......more
An international and interdisciplinary perspective on the adoption and governance of artificial intelligence (AI) and ma......more
An international and interdisciplinary perspective on the adoption and governance of artificial intelligence (AI) and ma......more
Keep sensitive user data safe and secure without sacrificing the performance and accuracy of your machine learning model......more
Blockchain is a recent technology that is promising to revolutionize the way supply chains are designed and operated. Re......more
...more
This book provides practical knowledge and skills on high-speed networks, emphasizing on Science Demilitarized Zones (Sc......more
This book is a compilation of selected papers from the Sixth International Symposium on Software Reliability, Industrial......more
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax--Managing the Risks and Results is a must......more
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax--Managing the Risks and Results is a must......more
This book constitutes the refereed proceedings of the Cryptographer’s Track at the RSA Conference 2023, CT-RSA 2023, hel......more
Turn the tables on cybercriminals. Keep your loved ones safe. We live much of our personal and professional lives online......more
DESCRIPTION Cloud platforms face unique security issues and opportunities because of their evolving designs and API-driv......more
CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, ......more
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conferenc......more
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conferenc......more
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conferenc......more
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conferenc......more
This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity E......more
Today we witness an explosive growth in attention to Q-computing. Q-computing technologies, along with artificial intell......more
"Cybersecurity has become one of the biggest risks facing companies today. There is a need to provide the tools and info......more
A beautifully produced anthology of crypto-artist, writer, and hacker Rhea Myers’s pioneering blockchain art, along with......more
"Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier--Arm pro......more
Crypto steganography (often simply called "stego") is a technique for concealing secret digital information within other......more
Cryptographic techniques are essential for secure data distribution, especially when sensitive information needs to be t......more
The prime concern in data communication over a transmission channel is the security of the data which is being exchanged......more
The prime concern in data communication over a transmission channel is the security of the data which is being exchanged......more
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, priva......more
This book constitutes refereed proceedings of the International Conference on Security, Privacy and Data Analytics, ISPD......more
Image forgery is a growing concern in today’s era of extensive use of social media. It has changed the way people normal......more
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and ......more
Global Coordination for Crypto Taxation Foundation" is a comprehensive book that delves into the complexities surroundin......more
With the increasing use of e-learning, technology has not only revolutionized the way businesses operate but has also im......more
This book introduces some fundamentals of information and communication technology (ICT) and other current and future te......more
This book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022......more
This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer Scho......more
This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Securi......more
This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Ko......more
Mastering Blockchain, Fourth Edition, is the blockchain bible to equip you with extensive knowledge of distributed ledge......more
...more
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level crypt......more
This book constitutes the refereed proceedings of the First International Workshop, FL 2022, Held in Conjunction with IJ......more
A leading legal scholar offers a compelling new theory to explain the meteoric rise of non-fungible tokens (NFTs) and th......more
With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Securit......more
Web3 may be the next big disrupter in business. Don’t be caught unprepared. Blockchain and crypto aren’t just for specul......more
This book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis ......more