The term Fintech is a combination of the words "financial" and "technology," which is now a real business need. However,......more
The term Fintech is a combination of the words "financial" and "technology," which is now a real business need. However,......more
An unfortunate outcome of the growth of the internet and mobile technologies has been the challenge of countering cyberc......more
Based on work done within ETSI, this comprehensive guide dives deep into the heart of blockchains and their imminent int......more
Aid organizations usually embrace the idea of digitalization, both in terms of using diverse technologies and processing......more
This book is an introductory account for policy makers, academia and interested readers on the digital technologies on I......more
This book is an introductory account for policy makers, academia and interested readers on the digital technologies on I......more
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more
Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banki......more
In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical ......more
The New Quantum Mechanics is a forward-thinking exploration into the rapidly evolving field of quantum mechanics. It off......more
...more
...more
...more
...more
...more
...more
...more
...more
This book provides readers with the necessary capabilities to meet the challenge of building and testing resilient IT se......more
Learn how to implement smaller, more secure public key protocols with this accessible guide to Elliptic Curve Cryptograp......more
The Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Draw......more
This open-access book is premised on the belief that understanding and protecting privacy requires a multidisciplinary a......more
This open-access book is premised on the belief that understanding and protecting privacy requires a multidisciplinary a......more
...more
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more
NEW YORK TIMES BESTSELLER - An exhilarating tour of humanity’s next great technological achievement--quantum computing--......more
This book constitutes the refereed proceedings of the 38th IFIP TC 11 International Conference on Information Security a......more
...more
...more
...more
Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banki......more
Today, machine learning algorithms are often distributed across multiple machines to leverage more computing power and m......more
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases ......more
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Securi......more
This 3-volume set, CCIS 2058-2060 constitutes the First International Conference, on Artificial Intelligence, IAIC 2023,......more
The Comprehensive Guide to Cybersecurity Careers is the definitive resource for aspiring and established cybersecurity p......more
This comprehensive guide provides professionals, hiring managers, and business leaders with essential strategies and ins......more
There is a lot of recent excitement about blockchain but the debate is often not conceptually grounded. Blockchain’s inn......more
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more
This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis ......more
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Securi......more
This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It co......more
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International......more
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International......more
When you launch an application on the web, every hacker in the world has access to it. Are you sure your web apps can st......more
The two-volume proceedings constitutes the refereed proceedings of the 24th International Conference on Progress in Cryp......more
The two-volume proceedings constitutes the refereed proceedings of the 24th International Conference on Progress in Cryp......more
This book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, ......more
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-......more
This book presents an up-to-date perspective on randomized response techniques (RRT). It discusses the most appropriate ......more
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a......more
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a......more
A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolut......more
Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulner......more
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerabil......more
...more
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersec......more
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersec......more
The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber s......more
Transformative Artificial Intelligence provides a comprehensive overview of the latest trends, challenges, applications,......more
This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly bec......more
The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by t......more
"A Hacker’s Mind...sheds vital light on the beginnings of our journey into an increasingly complex world." --Financial T......more
This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensiv......more
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based alg......more
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in co......more
The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implem......more
This important text/reference presents a comprehensive guide to the field of computing and information security and assu......more
This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more
This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more
This book--consisting of four parts--brings forth a comprehensive evaluation of information and communication technologi......more
Advances in Emerging Financial Technology and Digital Money provide a platform for collective reflection, bringing toget......more
Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implem......more
...more
...more
...more
...more
This book presents an overview of the blockchain-based Internet of Things systems, along with the opportunities, challen......more
To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset exp......more
To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset exp......more
Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspe......more
Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecur......more
An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the ave......more
This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data......more
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer In......more
This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, ......more
This book constitutes the proceedings of the 25th International Conference on Passive and Active Measurement, PAM 2024, ......more
This book pioneers the synergy between state-of-the-art edge computing technologies and the power of operations research......more
From Exposed To Secure reveals the everyday threats that are putting your company in danger and where to focus your reso......more
Cloud security is a rapidly evolving field, demanding professionals with specialized knowledge and expertise. This book ......more
Blockchain secures individual transactions with cryptography, creating a tamper-proof chain. In contrast, distributed le......more
A comprehensive, fully illustrated guide to the fascinating sport of picking locks, Locksport is authored by five of the......more