This book provides a comprehensive overview of the latest trends, challenges, applications, and opportunities in the fie......more
Learn how to implement, deploy, and manage blockchain solutions across AWS, Azure, and GCP with the help of hands-on lab......more
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Securi......more
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Securi......more
This book constitutes the refereed post proceedings of the 22nd International Workshop on Digital Forensics and Watermar......more
"A Hacker’s Mind...sheds vital light on the beginnings of our journey into an increasingly complex world." --Financial T......more
Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving a......more
This book contains selected papers presented at the 18th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer Scho......more
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based alg......more
...more
The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implem......more
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Con......more
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Con......more
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Con......more
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International......more
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Con......more
The native-born . . . have walked constantly with me, but only as shadows. In libraries and manuscript rooms, in the fad......more
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-......more
This book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, ......more
This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensiv......more
This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more
This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more
Today, machine learning algorithms are often distributed across multiple machines to leverage more computing power and m......more
This 3-volume set, CCIS 2058-2060 constitutes the First International Conference, on Artificial Intelligence, IAIC 2023,......more
This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly bec......more
...more
...more
This book presents an up-to-date perspective on randomized response techniques (RRT). It discusses the most appropriate ......more
This comprehensive book presents a new approach to dynamic distributed virtual systems. Wireless grids edgeware promises......more
Advances in Emerging Financial Technology and Digital Money provide a platform for collective reflection, bringing toget......more
Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implem......more
The two-volume proceedings constitutes the refereed proceedings of the 24th International Conference on Progress in Cryp......more
The two-volume proceedings constitutes the refereed proceedings of the 24th International Conference on Progress in Cryp......more
Take your blockchain and Web3 development skills to the next level by building real-world full-stack DeFi applications w......more
Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense agai......more
Master the art of configuring and securing Microsoft 365, emphasizing robust security and compliance features, and manag......more
Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehe......more
This reference text presents an overview of the blockchain-based internet of things systems, along with the opportunitie......more
To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset exp......more
To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset exp......more
Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecur......more
Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspe......more
This monograph presents a comprehensive exploration of Reverse Engineering of Deceptions (RED) in the field of adversari......more
Bitcoin Development Philosophy is a comprehensive guide aimed at developers who have a foundational understanding of Bit......more
An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the ave......more
Spoof-Proof Yourself The future belongs to the cyber-resilient. Whether you’re an individual navigating the vast online ......more
This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, ......more
This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, ......more
This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data......more
A comprehensive, fully illustrated guide to the fascinating sport of picking locks, Locksport is authored by five of the......more
Cloud security is a rapidly evolving field, demanding professionals with specialized knowledge and expertise. This book ......more
Blockchain secures individual transactions with cryptography, creating a tamper-proof chain. In contrast, distributed le......more
This book pioneers the synergy between state-of-the-art edge computing technologies and the power of operations research......more
From Exposed To Secure reveals the everyday threats that are putting your company in danger and where to focus your reso......more
This book summarizes the latest findings in critical infrastructure protection and related research areas. Armed conflic......more
In the ever-evolving world of cryptocurrency, scalability has emerged as one of the most pressing challenges. As the num......more
This book provides readers with the necessary capabilities to meet the challenge of building and testing resilient IT se......more
This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the ......more
This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the ......more
Unlock the Potential of Quantum Computing This expertly crafted guide demystifies the complexities of quantum computing ......more
Unlock the Potential of Quantum Computing This expertly crafted guide demystifies the complexities of quantum computing ......more
This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during Nov......more
Long celebrated as a modern master of graphic literature, David Small has elicited in his work comparisons to Stan Lee a......more
If you are worried about falling victim to cyber threats and having your sensitive data compromised, then keep reading........more
It is unclear if U.S. policy makers and military leaders fully realize that we have already been thrust into an artifici......more
Released in 2017, the first edition of Why CISOs Fail reimagined the role of the Chief Information Security Officer in a......more
Released in 2017, the first edition of Why CISOs Fail reimagined the role of the Chief Information Security Officer in a......more
Shurick Agapitov’s Once Upon Tomorrow unpacks the sometimes vague concept of the metaverse and shares the opportunities ......more
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptograp......more
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptograp......more
A practical guide to deploying, managing, and leveraging the power of Microsoft’s unified security solution Key Features......more
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptograp......more
Join us in the beginning of a conversation and what we hope will be a community dedicated to leveraging some of the late......more
Join us in the beginning of a conversation and what we hope will be a community dedicated to leveraging some of the late......more
Pen Testing from Contract to Report Protect your system or web application with this accessible guide Penetration tests,......more
How can you manage the complex threats that can cause financial, operational and reputational damage to the business? Th......more
How can you manage the complex threats that can cause financial, operational and reputational damage to the business? Th......more
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security......more
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information techn......more
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information techn......more
Secure Coding Practices: Fortifying Applications Against Cyber Threats is a comprehensive guide that explores the import......more
This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitione......more
This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitione......more
Blockchain Beyond Bitcoin: A deep dive into the emerging technologies and innovations powered by blockchain, such as sma......more
Enhance your skills as a cloud investigator to adeptly respond to cloud incidents by combining traditional forensic tech......more
This book offers an in-depth exploration of the application of blockchain and smart contract technologies in the field o......more
Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Ever......more
A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cy......more
This handbook provides thorough, in-depth, and well-focused developments of artificial intelligence (AI), machine learni......more
A must-read exploration of lock and physical security from a renowned author and expert In Tobias on Locks and Insecurit......more
...more
This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography, SAC......more
Internet of Things (IoT) is coined in 1999 by Kevin Ashton. IoT can be defined in many ways. ’Internet’ refers to the int......more
Digital Transformation in Education and Artificial Intelligence: Emerging Markets and Opportunities aims to shed light o......more
IoT security technologies ensure the protection of devices and networks associated with Internet of Things (IoT) ecosyst......more