A comprehensive introduction to the fundamentals of provable security for advanced undergraduates. This accessible textb......more
A gripping true story about one ransomware attack and the hands-on lessons you can learn from it In Locked Up: Lessons L......more
A digital twin (DT) is a digital representation of a real-world physical product, system, or process. It is indistinguis......more
This book examines the safety and security of event planning, from small and mid-sized events to large scale events requ......more
This textbook is a product of the author s experience teaching software engineering courses and directing student softwa......more
...more
This book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS 2025, h......more
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference on Fina......more
...more
...more
Emerging and pivotal technologies such as artificial intelligence and deep learning, cloud computing, internet of things......more
This book uses a mixed-methods approach to understand the role of technology in facilitating exploitation in the UK’s of......more
This volume constitutes the refereed proceedings of the 21st IFIP WG 11.9 International Conference on Advances in Digita......more
This book provides a comprehensive discussion of how quantum cryptography is changing cybersecurity. It starts by emphas......more
This book provides a comprehensive exploration of the engineering and scientific principles behind the Metaverse, a 3D d......more
This book constitutes the refereed proceedings of the First International Conference on Software Engineering for Emergin......more
A deep dive into cryptographic hardware architectures, providing a structured approach to secure computing. This book ex......more
A deep dive into cryptographic hardware architectures, providing a structured approach to secure computing. This book ex......more
The aim of this book is to provide a comprehensive exploration of the recent developments in the field of quantum comput......more
Blockchain technology, with its transparency, security, and immutability, offers promising applications in environmental......more
...more
This book presents a collection of high-quality, peer-reviewed research papers from First International Conference on In......more
This book provides a comprehensive overview of cyber-physical systems and the security concepts like attack detection me......more
This reference text presents an overview of the blockchain-based internet of things systems, along with the opportunitie......more
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, ......more
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the inter......more
In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical ......more
This book discusses various recent techniques and solutions related to IoT deployment, especially security, and privacy.......more
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, ......more
The book Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation will be of value ......more
...more
He didn’t just chase cybercriminals--he became one of them. In this electrifying blend of true crime, cyber espionage, a......more
He didn’t just chase cybercriminals--he became one of them. In this electrifying blend of true crime, cyber espionage, a......more
This book explores the intersection of quantum computing and network science. It bridges the theoretical foundations of ......more
Nonlocal Quantum Computing Theory offers a fresh perspective on quantum computing, moving beyond the traditional qubit-b......more
Accelerated Quantum Technologies Change Management offers business and technology leaders a guide to navigating and acce......more
This book provides a comprehensive overview of cybersecurity management in ports, cybersecurity vulnerabilities, and man......more
Quantum technologies (QT) are rapidly advancing from scientific propositions to commercial realities. QT leverage quantu......more
As organizations are still attempting to figure out how to navigate AI risks, compliance, and governance, The Definitive......more
Cryptography has long been an essential tool in safeguarding digital communication and securing sensitive information. A......more
The book explores how quantum computing can protect AI systems from sophisticated adversarial threats. As AI application......more
As organizations are still attempting to figure out how to navigate AI risks, compliance, and governance, The Definitive......more
Cryptography has long been an essential tool in safeguarding digital communication and securing sensitive information. A......more
This book constitutes the refereed proceedings of the 21st International Conference on Information Systems Security, ICI......more
...more
A complete and up-to-date overview of popular and practical erasure codes in distributed storage In Distributed Storage ......more
Unlock the secrets to safeguarding AI by exploring the top risks, essential frameworks, and cutting-edge strategies-feat......more
This book constitutes the refereed proceedings of the 26th International Conference on Cryptology in India, held in Bhub......more
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theor......more
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theor......more
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theor......more
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theor......more
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theor......more
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theor......more
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theor......more
In today’s hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips you......more
In today’s hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips you......more
...more
This timely compendium provides state-of-the-art articles covering research areas in Nanoelectronics, Nanophotonics and ......more
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theor......more
...more
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory......more
As data becomes more abundant and widespread across personal devices, the need for secure, privacy-aware machine learnin......more
Build modern, secure, and scalable cloud-native solutions on Azure with expert-guided architecture patterns Key Features......more
Strategic Security Management, Third Edition is a vital roadmap for modern security professionals, delivering a comprehe......more
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory......more
This book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-......more
As modern infrastructures become increasingly automated, non-human identities, such as service accounts, API tokens, and......more
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory......more
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory......more
This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP 2025,......more
The book reviews the zero-trust model that deviates from the traditional definition of trust boundaries and validates al......more
A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territor......more
Cybersecurity Leadership: Ancient Wisdom for the Digital Battlefield In an era where cyberattacks can bring global corpo......more
This textbook introduces the fundamental concepts and techniques used in biometric recognition to students, practitioner......more
When power no longer needs boots to cross a border, it arrives through updates, outages, and the quiet recalibration of ......more
Power today is exercised in quiet rooms and cached files, not on battlefields. If you want to understand why a headline ......more
Power today is exercised in quiet rooms and cached files, not on battlefields. If you want to understand why a headline ......more
When power no longer needs boots to cross a border, it arrives through updates, outages, and the quiet recalibration of ......more
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approa......more
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approa......more
Discover step-by-step solutions for tackling real-world cybersecurity tasks using essential Kali Linux tools and techniq......more
Unlock the full potential of Microsoft Intune Suite with hands-on deployment, policy control, architecture insights, and......more
...more
...more
As the world rapidly advances toward unparalleled connectivity and urbanization, the intersection of state-of-the-art te......more
This book highlights the physical processes of quantum mechanics, such as quantum interference, entanglement, and quantu......more
This book constitutes the proceedings of the 20th International Workshop on Security on Advances in Information and Comp......more
...more
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligenc......more
15 Methods to Generate $7,500 to $11,000 in 6 to 12 Months Using AI Tools While Working Remotely FOR JUST $30.00 DON’T M......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learni......more
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is n......more
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is n......more