We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 9,858 results
  1. Android Malware Detection and Adversarial Methods

    The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on...

    Weina Niu, **aosong Zhang, ... Jiacheng Gong
    Book 2024
  2. Identity Attack Vectors Strategically Designing and Implementing Identity Security, Second Edition

    Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a...

    Morey J. Haber, Darran Rolls
    Book 2024
  3. Introduction to One Digital Identity Strategies, Innovations, and Future Trends

    Explore the dynamics of digital identity, a crucial component in today’s modern technology-driven era. This engaging book offers a deep understanding...

    Shivakumar R. Goniwada
    Book 2024
  4. Mastering Cybersecurity Strategies, Technologies, and Best Practices

    The modern digital landscape presents many threats and opportunities, necessitating a robust understanding of cybersecurity. This book offers readers...

    Dr. Jason Edwards
    Book 2024
  5. Jump-start Your SOC Analyst Career A Roadmap to Cybersecurity Success

    The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center...

    Tyler Wall, Jarrett Rodrick
    Book 2024
  6. The IT Support Handbook A How-To Guide to Providing Effective Help and Support to IT Users

    Become a more effective tech professional by learning how to provide the most useful IT support for your users. You'll learn how to efficiently and...

    Mike Halsey
    Book 2024
  7. Information Security Applications 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers

    This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in...
    Howon Kim, Jonghee Youn in Lecture Notes in Computer Science
    Conference proceedings 2024
  8. Pattern Recognition and Computer Vision 6th Chinese Conference, PRCV 2023, **amen, China, October 13–15, 2023, Proceedings, Part IV

    The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision,...

    Qingshan Liu, Hanzi Wang, ... Rongrong Ji in Lecture Notes in Computer Science
    Conference proceedings 2024
  9. Computer Applications 38th CCF Conference of Computer Applications, CCF NCCA 2023, Suzhou, China, July 16–20, 2023, Proceedings, Part II

    The two-volume set CCIS 1959 and 1960 constitutes the refereed post-conference proceedings of the 38th CCF National Conference on Computer...
    Min Zhang, Bin Xu, ... Zeguang Lu in Communications in Computer and Information Science
    Conference proceedings 2024
  10. Computer Applications 38th CCF Conference of Computer Applications, CCF NCCA 2023, Suzhou, China, July 16–20, 2023, Proceedings, Part I

    The two-volume set CCIS 1959 and 1960 constitutes the refereed post-conference proceedings of the 38th CCF National Conference on Computer...
    Min Zhang, Bin Xu, ... Zeguang Lu in Communications in Computer and Information Science
    Conference proceedings 2024
  11. Frontiers in Cyber Security 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers

    This volume constitutes the refereed proceedings of the 6th International Conference on Frontiers in Cyber Security, FCS 2023, held in Chengdu,...
    Conference proceedings 2024
  12. Theoretical Computer Science 41st National Conference, NCTCS 2023, Guangzhou, China, July 21–23, 2023, Revised Selected Papers

    This book constitutes the refereed proceedings of the 41st National Conference on Theoretical Computer Science, NCTCS 2023, held in Guangzhou,...
    Zhi** Cai, Mingyu **ao, Jialin Zhang in Communications in Computer and Information Science
    Conference proceedings 2024
  13. Pattern Recognition and Computer Vision 6th Chinese Conference, PRCV 2023, **amen, China, October 13–15, 2023, Proceedings, Part VII

    The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision,...

    Qingshan Liu, Hanzi Wang, ... Rongrong Ji in Lecture Notes in Computer Science
    Conference proceedings 2024
  14. Pattern Recognition and Computer Vision 6th Chinese Conference, PRCV 2023, **amen, China, October 13–15, 2023, Proceedings, Part X

    The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision,...

    Qingshan Liu, Hanzi Wang, ... Rongrong Ji in Lecture Notes in Computer Science
    Conference proceedings 2024
  15. Designing to FIPS-140 A Guide for Engineers and Programmers

    This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and...

    David Johnston, Richard Fant
    Book 2024
  16. Information Technology Security Modern Trends and Challenges

    This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative,...

    Debasis Gountia, Dilip Kumar Dalei, Subhankar Mishra in Springer Tracts in Electrical and Electronics Engineering
    Book 2024
  17. ICT Innovations 2023. Learning: Humans, Theory, Machines, and Data 15th International Conference, ICT Innovations 2023, Ohrid, North Macedonia, September 24–26, 2023, Proceedings

    This book constitutes the refereed proceedings of the 15th International Conference on ICT Innovations 2023. Learning: Humans, Theory, Machines, and...
    Conference proceedings 2024
  18. Data and Applications Security and Privacy XXXVIII 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15–17, 2024, Proceedings

    This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024,...

    Anna Lisa Ferrara, Ram Krishnan in Lecture Notes in Computer Science
    Conference proceedings 2024
  19. Mobile Internet Security 7th International Conference, MobiSec 2023, Okinawa, Japan, December 19–21, 2023, Revised Selected Papers

    This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa,...

    Ilsun You, Michał Choraś, ... Philip Virgil Astillo in Communications in Computer and Information Science
    Conference proceedings 2024
  20. CyberSecurity in a DevOps Environment From Requirements to Monitoring

    This book provides an overview of software security analysis in a DevOps cycle including requirements formalisation, verification and continuous...

    Andrey Sadovykh, Dragos Truscan, ... Alessandra Bagnato
    Book 2024
Did you find what you were looking for? Share feedback.