This book examines the safety and security of event planning, from small and mid-sized events to large scale events requ......more
This textbook is a product of the author s experience teaching software engineering courses and directing student softwa......more
This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more
...more
Many of the words used to describe disease (’infection’, ’transmission’, ’virus’) are also used to characterize cyber se......more
An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
Hands-on guidance for professionals investigating crimes that include cryptocurrency In There’s No Such Thing as Cryptoc......more
...more
...more
In addition to laying the foundation for today s online security industry, PKC made encryption technologies accessible t......more
...more
...more
...more
The overarching purpose of this book is to provide the reader with an examination of some of the most cutting edge issue......more
Emerging drugs such as synthetic marijuana and bath salts present critical problems not only for the public but also for......more
This volume offers a concise overview of cyber warfare, providing historical context and an examination of its rapid dev......more
Die Entwicklung und Analyse von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Gro e Berühmtheit......more
An example-driven guide to securing access to your applications with OpenID Connect, the OAuth-based identity layer that......more
...more
...more
...more
A broad introduction to cryptography--what it is, how it really works, what its future holds, and why every informed cit......more
Facial recognition technology is increasingly used for identity verification and identification, from aiding law enforce......more
Through the application of cutting-edge techniques like Big Data, Data Mining, and Data Science, it is possible to extra......more
This book is a machine-generated literature overview of the legal and ethical debates over privacy and data protection m......more
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of tech......more
A must-read roadmap to analyzing, valuing, and investing in cryptocurrency and other digital assets In Investing in Cryp......more
...more
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more
...more
The first-ever introduction to the full range of cybersecurity challenges and solutions Cybersecurity is crucial for pre......more
Master the dual arts of functional programming and advanced math with this illuminating intro to mathematical functions-......more
...more
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed ......more
...more
...more
...more
In today’s cloud native world, where we automate as much as possible, everything is code. With this practical guide, you......more
This unique compendium is based on the author’s teaching and research experiences. It covers the fundamental principles ......more
Web3 is a new frontier of internet architecture emphasizing decentralization and user control. This text for MBA student......more
Counter Terrorism Issues: Case Studies in the Courtroom, Second Edition presents a panoramic view of the American judici......more
Counter Terrorism Issues: Case Studies in the Courtroom, Second Edition presents a panoramic view of the American judici......more
Data mining is a process to extract useful knowledge from large amounts of data. To conduct data mining, we often need t......more
Have you wondered how hackers and nation states gain access to confidential information and the most secure environments......more
Have you wondered how hackers and nation states gain access to confidential information and the most secure environments......more
Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by eve......more
The book offers a comprehensive exploration of the fusion between quantum technology, AI, and robotics, providing reader......more
This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the incr......more
This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the incr......more
Recently, the fields of Artificial Intelligence (AI) and the Internet of Things (IoT) have revolutionized numerous indus......more
An engaging and comprehensive exploration of how fundamental ideas in political and legal thought shape the governance o......more
...more
This book offers a thorough examination of the potential of blockchain to transform musical practices. Moving beyond blo......more
This book offers a thorough examination of the potential of blockchain to transform musical practices. Moving beyond blo......more
The aim of this book is to demonstrate the use of business driven risk assessments to meet the requirements within priva......more
The author won the ACM Doctoral Dissertation Award (2000) for the best Ph.D. thesis in Electrical Engineering & Computer......more
A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Agai......more
Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more
This vital work for researchers and graduate students focuses on resilience estimation and control of cyber-physical net......more
Leaders across the globe have a common challenge they cannot ignore: CHANGE. This must be embraced and effectively manag......more
Leaders across the globe have a common challenge they cannot ignore: CHANGE. This must be embraced and effectively manag......more
This book presents cutting-edge findings that draw on the use of AI, the Industrial Internet of Things, Blockchain, and ......more
How can organizations integrate security while continuously deploying new features? How can some maintain 24-7-365 opera......more
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics ......more
As the computers and other machines have been developed, researchers and scientists have worked very hard to increase th......more
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPS) due to the interc......more
This practical guide to building embedded and IoT devices securely is an essential resource for current and future devel......more
Developing a Security Training Program focuses on how to establish a comprehensive training program for a security depar......more
Developing a Security Training Program focuses on how to establish a comprehensive training program for a security depar......more
Independent Directors of corporate boards understand the importance of cybersecurity as a business issue. Increased regu......more
Independent Directors of corporate boards understand the importance of cybersecurity as a business issue. Increased regu......more
...more
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in co......more
Blockchain: The Key to the World of Cryptocurrencies. A word that sounds like a promise of wealth. But what exactly is B......more
Blockchain: The Key to the World of Cryptocurrencies. A word that sounds like a promise of wealth. But what exactly is B......more
"An informative, one-stop resource for understanding the birth and evolution of cyber warfare, notable examples of its u......more
THE WILD INSIDE STORY OF CRYPTO’S GET-RICH-QUICK UNDERBELLY Nat Eliason had six months to make as much money as possible......more
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more
With the ever-increasing threat of cyber-attacks, especially as the COVID-19 pandemic helped to ramp up the use of digit......more
Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics examines the most c......more
Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics examines the most c......more
The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It......more