The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber s......more
This book provides a comprehensive overview of the latest trends, challenges, applications, and opportunities in the fie......more
Learn how to implement, deploy, and manage blockchain solutions across AWS, Azure, and GCP with the help of hands-on lab......more
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Securi......more
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Securi......more
This book constitutes the refereed post proceedings of the 22nd International Workshop on Digital Forensics and Watermar......more
"A Hacker’s Mind...sheds vital light on the beginnings of our journey into an increasingly complex world." --Financial T......more
Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving a......more
The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by t......more
This book contains selected papers presented at the 18th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer Scho......more
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based alg......more
Facial recognition technology is increasingly used for identity verification and identification, from aiding law enforce......more
...more
...more
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information......more
This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis ......more
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International......more
The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implem......more
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Con......more
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Con......more
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Con......more
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Con......more
The native-born . . . have walked constantly with me, but only as shadows. In libraries and manuscript rooms, in the fad......more
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-......more
This important text/reference presents a comprehensive guide to the field of computing and information security and assu......more
This book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, ......more
...more
This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensiv......more
...more
Today, machine learning algorithms are often distributed across multiple machines to leverage more computing power and m......more
This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more
This book provides a foundational project management methodology relevant to the emergency management practice, and expl......more
...more
This 3-volume set, CCIS 2058-2060 constitutes the First International Conference, on Artificial Intelligence, IAIC 2023,......more
This book--consisting of four parts--brings forth a comprehensive evaluation of information and communication technologi......more
This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly bec......more
...more
...more
...more
This book presents an up-to-date perspective on randomized response techniques (RRT). It discusses the most appropriate ......more
This comprehensive book presents a new approach to dynamic distributed virtual systems. Wireless grids edgeware promises......more
Advances in Emerging Financial Technology and Digital Money provide a platform for collective reflection, bringing toget......more
The two-volume proceedings constitutes the refereed proceedings of the 24th International Conference on Progress in Cryp......more
The two-volume proceedings constitutes the refereed proceedings of the 24th International Conference on Progress in Cryp......more
Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implem......more
Take your blockchain and Web3 development skills to the next level by building real-world full-stack DeFi applications w......more
Explore top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense agai......more
Master the art of configuring and securing Microsoft 365, emphasizing robust security and compliance features, and manag......more
Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehe......more