Search
Search Results
-
Android Malware Detection and Adversarial Methods
The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on...
-
Identity Attack Vectors Strategically Designing and Implementing Identity Security, Second Edition
Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a...
-
Introduction to One Digital Identity Strategies, Innovations, and Future Trends
Explore the dynamics of digital identity, a crucial component in today’s modern technology-driven era. This engaging book offers a deep understanding...
-
Mastering Cybersecurity Strategies, Technologies, and Best Practices
The modern digital landscape presents many threats and opportunities, necessitating a robust understanding of cybersecurity. This book offers readers...
-
Jump-start Your SOC Analyst Career A Roadmap to Cybersecurity Success
The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center...
-
The IT Support Handbook A How-To Guide to Providing Effective Help and Support to IT Users
Become a more effective tech professional by learning how to provide the most useful IT support for your users. You'll learn how to efficiently and...
-
Information Security Applications 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers
This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in... -
Pattern Recognition and Computer Vision 6th Chinese Conference, PRCV 2023, **amen, China, October 13–15, 2023, Proceedings, Part IV
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision,...
-
Computer Applications 38th CCF Conference of Computer Applications, CCF NCCA 2023, Suzhou, China, July 16–20, 2023, Proceedings, Part II
The two-volume set CCIS 1959 and 1960 constitutes the refereed post-conference proceedings of the 38th CCF National Conference on Computer... -
Computer Applications 38th CCF Conference of Computer Applications, CCF NCCA 2023, Suzhou, China, July 16–20, 2023, Proceedings, Part I
The two-volume set CCIS 1959 and 1960 constitutes the refereed post-conference proceedings of the 38th CCF National Conference on Computer... -
Frontiers in Cyber Security 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers
This volume constitutes the refereed proceedings of the 6th International Conference on Frontiers in Cyber Security, FCS 2023, held in Chengdu,... -
Theoretical Computer Science 41st National Conference, NCTCS 2023, Guangzhou, China, July 21–23, 2023, Revised Selected Papers
This book constitutes the refereed proceedings of the 41st National Conference on Theoretical Computer Science, NCTCS 2023, held in Guangzhou,... -
Pattern Recognition and Computer Vision 6th Chinese Conference, PRCV 2023, **amen, China, October 13–15, 2023, Proceedings, Part VII
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision,...
-
Pattern Recognition and Computer Vision 6th Chinese Conference, PRCV 2023, **amen, China, October 13–15, 2023, Proceedings, Part X
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision,...
-
Designing to FIPS-140 A Guide for Engineers and Programmers
This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and...
-
Information Technology Security Modern Trends and Challenges
This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative,...
-
ICT Innovations 2023. Learning: Humans, Theory, Machines, and Data 15th International Conference, ICT Innovations 2023, Ohrid, North Macedonia, September 24–26, 2023, Proceedings
This book constitutes the refereed proceedings of the 15th International Conference on ICT Innovations 2023. Learning: Humans, Theory, Machines, and... -
Data and Applications Security and Privacy XXXVIII 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15–17, 2024, Proceedings
This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024,...
-
Mobile Internet Security 7th International Conference, MobiSec 2023, Okinawa, Japan, December 19–21, 2023, Revised Selected Papers
This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa,...
-
CyberSecurity in a DevOps Environment From Requirements to Monitoring
This book provides an overview of software security analysis in a DevOps cycle including requirements formalisation, verification and continuous...