This book examines the safety and security of event planning, from small and mid-sized events to large scale events requ......more
This textbook is a product of the author s experience teaching software engineering courses and directing student softwa......more
This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more
...more
Many of the words used to describe disease (’infection’, ’transmission’, ’virus’) are also used to characterize cyber se......more
An incisive discussion of the most critical issues facing security and tech In Listen and Repair: A Guide for Security a......more
Cryptography is a part of everyday life for almost all of us, though we may not realise we’re using it. We are a far cry......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
Master the dual arts of functional programming and advanced math with this illuminating intro to mathematical functions-......more
In an era where cybersecurity threats are escalating and global regulations are intensifying, the need for a comprehensi......more
In an era where cybersecurity threats are escalating and global regulations are intensifying, the need for a comprehensi......more
Hands-on guidance for professionals investigating crimes that include cryptocurrency In There’s No Such Thing as Cryptoc......more
This volume offers a concise overview of cyber warfare, providing historical context and an examination of its rapid dev......more
This unique compendium is based on the author’s teaching and research experiences. It covers the fundamental principles ......more
...more
...more
Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to ......more
Cyber Security Foundations introduces the core topics that all cyber security students and future professionals need to ......more
In addition to laying the foundation for today s online security industry, PKC made encryption technologies accessible t......more
...more
...more
...more
The overarching purpose of this book is to provide the reader with an examination of some of the most cutting edge issue......more
Emerging drugs such as synthetic marijuana and bath salts present critical problems not only for the public but also for......more
In this book, the most important cryptographic algorithms, protocols and constructions of the last decades are explained......more
An example-driven guide to securing access to your applications with OpenID Connect, the OAuth-based identity layer that......more
The movement of people and goods from one location to another has always been essential to human development and surviva......more
This Handbook aims to serve as a one-stop, reliable resource, including curated surveys and expository contributions on ......more
...more
An exploration of the emerging quantum technological paradigm and its effects on human consciousness and cultures. In Qu......more
...more
...more
"An EKS introduction to cryptography from an expert in the field"--...more
Through the application of cutting-edge techniques like Big Data, Data Mining, and Data Science, it is possible to extra......more
Crypto can be cryptic. Serious Cryptography, 2nd Edition arms you with the tools you need to pave the way to understandi......more
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of tech......more
This book is a machine-generated literature overview of the legal and ethical debates over privacy and data protection m......more
A must-read roadmap to analyzing, valuing, and investing in cryptocurrency and other digital assets In Investing in Cryp......more
Meet the latest challenges in quantum computing with this cutting-edge volume Miniaturization is one of the major forms ......more
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain se......more
The book offers a critical exploration of the integration of AI, blockchain, and metaverse technology in the hospitality......more
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, "Spies in th......more
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurit......more
The fourth industrial revolution, Industry 4.0 is changing the world, and digital transformation technology tools have i......more
...more
The effectiveness of internal audit activities is important for the sustainability of change in the public sector. In th......more
The first-ever introduction to the full range of cybersecurity challenges and solutions Cybersecurity is crucial for pre......more
Federated Learning: Unlocking the Power of Collaborative Intelligence is a definitive guide to the transformative potent......more
Smart manufacturing environments are revolutionizing the industrial sector by integrating advanced technologies, such as......more
The convergence of Artificial Intelligence (AI) and Financial Technology (Fintech) has ushered in a new era of innovatio......more
...more
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed ......more
Psybersecurity: Human Factors of Cyber Defence is a clarion call to action in the face of a stark reality: over 90% of c......more
Blockchain Intelligence: Exploring AI, DeFi, Metaverses, and NFTs in the Crypto Revolution delves into the revolutionary......more
Blockchain Intelligence: Exploring AI, DeFi, Metaverses, and NFTs in the Crypto Revolution delves into the revolutionary......more
In a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our children’s safety......more
In a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our children’s safety......more
Blockchain and distributed-ledger technologies enable new modes of communication, synchronization, and transfer of value......more
...more
In today’s cloud native world, where we automate as much as possible, everything is code. With this practical guide, you......more
This edited book explores the field of quantum computing and machine learning for medical data processing. Topics such a......more
Web3 is a new frontier of internet architecture emphasizing decentralization and user control. This text for MBA student......more
Counter Terrorism Issues: Case Studies in the Courtroom, Second Edition presents a panoramic view of the American judici......more
Counter Terrorism Issues: Case Studies in the Courtroom, Second Edition presents a panoramic view of the American judici......more
Data mining is a process to extract useful knowledge from large amounts of data. To conduct data mining, we often need t......more
Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by eve......more
The book offers a comprehensive exploration of the fusion between quantum technology, AI, and robotics, providing reader......more
Recently, the fields of Artificial Intelligence (AI) and the Internet of Things (IoT) have revolutionized numerous indus......more
This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the incr......more
This book covers the fundamental concepts of private AI and its applications. It also covers fusion of Private AI with c......more
An engaging and comprehensive exploration of how fundamental ideas in political and legal thought shape the governance o......more
Have you wondered how hackers and nation states gain access to confidential information and the most secure environments......more
Have you wondered how hackers and nation states gain access to confidential information and the most secure environments......more
This book offers a thorough exploration of the potential of blockchain and AI technologies to transform musical practice......more
This book offers a thorough exploration of the potential of blockchain and AI technologies to transform musical practice......more
"An informative, one-stop resource for understanding the birth and evolution of cyber warfare, notable examples of its u......more
The author won the ACM Doctoral Dissertation Award (2000) for the best Ph.D. thesis in Electrical Engineering & Computer......more
The aim of this book is to demonstrate the use of business driven risk assessments to meet the requirements within priva......more
Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more
A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Agai......more
Leaders across the globe have a common challenge they cannot ignore: CHANGE. This must be embraced and effectively manag......more
Leaders across the globe have a common challenge they cannot ignore: CHANGE. This must be embraced and effectively manag......more
This book presents cutting-edge findings that draw on the use of AI, the Industrial Internet of Things, Blockchain, and ......more
This vital work for researchers and graduate students focuses on resilience estimation and control of cyber-physical net......more
...more
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics ......more
As the computers and other machines have been developed, researchers and scientists have worked very hard to increase th......more
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPS) due to the interc......more