This book examines the safety and security of event planning, from small and mid-sized events to large scale events requ......more
This textbook is a product of the author s experience teaching software engineering courses and directing student softwa......more
This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more
...more
Many of the words used to describe disease (’infection’, ’transmission’, ’virus’) are also used to characterize cyber se......more
An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
Master the dual arts of functional programming and advanced math with this illuminating intro to mathematical functions-......more
In an era where cybersecurity threats are escalating and global regulations are intensifying, the need for a comprehensi......more
In an era where cybersecurity threats are escalating and global regulations are intensifying, the need for a comprehensi......more
Hands-on guidance for professionals investigating crimes that include cryptocurrency In There’s No Such Thing as Cryptoc......more
This volume offers a concise overview of cyber warfare, providing historical context and an examination of its rapid dev......more
This unique compendium is based on the author’s teaching and research experiences. It covers the fundamental principles ......more
...more
...more
Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to ......more
Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to ......more
In addition to laying the foundation for today s online security industry, PKC made encryption technologies accessible t......more
...more
...more
...more
The overarching purpose of this book is to provide the reader with an examination of some of the most cutting edge issue......more
Emerging drugs such as synthetic marijuana and bath salts present critical problems not only for the public but also for......more
In this book, the most important cryptographic algorithms, protocols and constructions of the last decades are explained......more
...more
An example-driven guide to securing access to your applications with OpenID Connect, the OAuth-based identity layer that......more
The movement of people and goods from one location to another has always been essential to human development and surviva......more
...more
An exploration of the emerging quantum technological paradigm and its effects on human consciousness and cultures. In Qu......more
...more
...more
...more
Through the application of cutting-edge techniques like Big Data, Data Mining, and Data Science, it is possible to extra......more
Crypto can be cryptic. Serious Cryptography, 2nd Edition arms you with the tools you need to pave the way to understandi......more
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of tech......more
This book is a machine-generated literature overview of the legal and ethical debates over privacy and data protection m......more
A must-read roadmap to analyzing, valuing, and investing in cryptocurrency and other digital assets In Investing in Cryp......more
Meet the latest challenges in quantum computing with this cutting-edge volume Miniaturization is one of the major forms ......more
...more
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more
The book offers a critical exploration of the integration of AI, blockchain, and metaverse technology in the hospitality......more
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more
The Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics examines the mo......more
The Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics examines the mo......more
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurit......more
...more
The fourth industrial revolution, Industry 4.0 is changing the world, and digital transformation technology tools have i......more
The effectiveness of internal audit activities is important for the sustainability of change in the public sector. In th......more
The first-ever introduction to the full range of cybersecurity challenges and solutions Cybersecurity is crucial for pre......more
Federated Learning: Unlocking the Power of Collaborative Intelligence is a definitive guide to the transformative potent......more
Smart manufacturing environments are revolutionizing the industrial sector by integrating advanced technologies, such as......more
The convergence of Artificial Intelligence (AI) and Financial Technology (Fintech) has ushered in a new era of innovatio......more
...more
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed ......more
Psybersecurity: Human Factors of Cyber Defence is a clarion call to action in the face of a stark reality: over 90% of c......more
Blockchain Intelligence: Exploring AI, DeFi, Metaverses, and NFTs in the Crypto Revolution delves into the revolutionary......more
Blockchain Intelligence: Exploring AI, DeFi, Metaverses, and NFTs in the Crypto Revolution delves into the revolutionary......more
In a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our children’s safety......more
In a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our children’s safety......more
Blockchain and distributed-ledger technologies enable new modes of communication, synchronization, and transfer of value......more
...more
This edited book explores the field of quantum computing and machine learning for medical data processing. Topics such a......more
Web3 is a new frontier of internet architecture emphasizing decentralization and user control. This text for MBA student......more
Counter Terrorism Issues: Case Studies in the Courtroom, Second Edition presents a panoramic view of the American judici......more
Counter Terrorism Issues: Case Studies in the Courtroom, Second Edition presents a panoramic view of the American judici......more
Data mining is a process to extract useful knowledge from large amounts of data. To conduct data mining, we often need t......more
Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by eve......more
The book offers a comprehensive exploration of the fusion between quantum technology, AI, and robotics, providing reader......more
Recently, the fields of Artificial Intelligence (AI) and the Internet of Things (IoT) have revolutionized numerous indus......more
This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the incr......more
This book covers the fundamental concepts of private AI and its applications. It also covers fusion of Private AI with c......more
This Handbook aims to serve as a one-stop, reliable resource, including curated surveys and expository contributions on ......more
...more
The New Quantum Mechanics is a forward-thinking exploration into the rapidly evolving field of quantum mechanics. It off......more
Have you wondered how hackers and nation states gain access to confidential information and the most secure environments......more
Have you wondered how hackers and nation states gain access to confidential information and the most secure environments......more
This book offers a thorough exploration of the potential of blockchain and AI technologies to transform musical practice......more
This book offers a thorough exploration of the potential of blockchain and AI technologies to transform musical practice......more
...more
...more
In today’s cloud native world, where we automate as much as possible, everything is code. With this practical guide, you......more
...more
The author won the ACM Doctoral Dissertation Award (2000) for the best Ph.D. thesis in Electrical Engineering & Computer......more
The aim of this book is to demonstrate the use of business driven risk assessments to meet the requirements within priva......more