This book examines the safety and security of event planning, from small and mid-sized events to large scale events requ......more
This textbook is a product of the author s experience teaching software engineering courses and directing student softwa......more
This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more
...more
Many of the words used to describe disease (’infection’, ’transmission’, ’virus’) are also used to characterize cyber se......more
An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
This unique compendium is based on the author’s teaching and research experiences. It covers the fundamental principles ......more
Master the dual arts of functional programming and advanced math with this illuminating intro to mathematical functions-......more
In this book, the most important cryptographic algorithms, protocols and constructions of the last decades are explained......more
...more
...more
Hands-on guidance for professionals investigating crimes that include cryptocurrency In There’s No Such Thing as Cryptoc......more
This volume offers a concise overview of cyber warfare, providing historical context and an examination of its rapid dev......more
A groundbreaking view of the industrial models of the future Industry 5.0 is an increasingly widespread term for the com......more
Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to ......more
Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to ......more
...more
...more
This book is a machine-generated literature overview of the legal and ethical debates over privacy and data protection m......more
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of tech......more
...more
In addition to laying the foundation for today s online security industry, PKC made encryption technologies accessible t......more
...more
...more
...more
The overarching purpose of this book is to provide the reader with an examination of some of the most cutting edge issue......more
Emerging drugs such as synthetic marijuana and bath salts present critical problems not only for the public but also for......more
...more
...more
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from ......more
A comprehensive monograph chronicling the phenomenal rise of CryptoPunks - one of the world’s first and most sought-afte......more
This book offers an introduction to Information Technology with regard to peace, conflict, and security research, a topi......more
Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more
This book presents the development of a classification scheme to organize and represent ransomware threat knowledge thro......more
Healthcare-Driven Intelligent Computing Paradigms to Secure Futuristic Smart Cities presents the applications of the hea......more
Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection ......more
An example-driven guide to securing access to your applications with OpenID Connect, the OAuth-based identity layer that......more
Secure your entire software supply chain, including the code you write, the libraries you use, and the platforms you run......more
...more
A CISO is the ultimate guardian of an organization’s digital assets. As a cybersecurity leader a CISO must possess a uni......more
A CISO is the ultimate guardian of an organization’s digital assets. As a cybersecurity leader a CISO must possess a uni......more
...more
Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly ever since them. For example......more
Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. The crit......more
Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly ever since them. For example......more
Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. The crit......more
An exploration of the emerging quantum technological paradigm and its effects on human consciousness and cultures. In Qu......more
...more
In today’s interconnected world, healthcare systems are increasingly turning to digital technologies to enhance patient ......more
"Zero to Hero: Your Guide to a Career in Cybersecurity" is an essential roadmap for anyone aiming to penetrate the vibra......more
"Zero to Hero: Your Guide to a Career in Cybersecurity" is an essential roadmap for anyone aiming to penetrate the vibra......more
Information Security primarily serves these six distinct purposes - Authentication, Authorization, Prevention of Data Th......more
Information Security primarily serves these six distinct purposes - Authentication, Authorization, Prevention of Data Th......more
’Insecure Digital Frontiers’ is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expa......more
The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment ......more
’Insecure Digital Frontiers’ is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expa......more
The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment ......more
Nowadays, the latest technologies can be found not only in healthcare and space application but also in hybrid supercars......more
...more
Discover the future of cybersecurity through the eyes of the world’s first augmented ethical hacker In Human Hacked: My ......more
In the era of digital transformation, the landscape of healthcare is undergoing a profound paradigm shift, driven by tec......more
In this smart era, Data Analytics and Artificial Intelligence (AI) play an important role in Predictive Maintenance (PdM......more
Crypto can be cryptic. Serious Cryptography, 2nd Edition arms you with the tools you need to pave the way to understandi......more
Through the application of cutting-edge techniques like Big Data, Data Mining, and Data Science, it is possible to extra......more
The first-ever introduction to the full range of cybersecurity challenges and solutions Cybersecurity is crucial for pre......more
A must-read roadmap to analyzing, valuing, and investing in cryptocurrency and other digital assets In Investing in Cryp......more
Meet the latest challenges in quantum computing with this cutting-edge volume Miniaturization is one of the major forms ......more
In the ever-evolving landscape of digital forensics and cyber-crime investigation, staying ahead with the latest advance......more
This book explores the dynamic intersection of quantum computing and management strategy, offering an exploration of thi......more
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more
The book offers a critical exploration of the integration of AI, blockchain, and metaverse technology in the hospitality......more
This book examines the intersection between cybersecurity and the law and economy of India, and offers a course of actio......more
The convergence of Artificial Intelligence (AI) and Financial Technology (Fintech) has ushered in a new era of innovatio......more
The Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics examines the mo......more
The Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics examines the mo......more
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurit......more
Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative pro......more
The aim of this book is to demonstrate the use of business driven risk assessments to meet the requirements within priva......more
The fourth industrial revolution, Industry 4.0 is changing the world, and digital transformation technology tools have i......more
The effectiveness of internal audit activities is important for the sustainability of change in the public sector. In th......more
...more
...more
Smart manufacturing environments are revolutionizing the industrial sector by integrating advanced technologies, such as......more
This open access book is authored by a rich mix of contributors from across the landscape of research, academia, LEAs, ......more
Federated Learning: Unlocking the Power of Collaborative Intelligence is a definitive guide to the transformative potent......more
This book presents high-quality, peer-reviewed papers from 3rd International Conference on "Universal Threats in Expert ......more
This textbook introduces the fundamental concepts and techniques used in biometric recognition to students, practitioner......more