Add Wish List Add to Cart The item has been added Quantum Computational Number Theory This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Global Cyber-Vulnerability Report This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Physical and Data-Link Security Techniques for Future Communication Systems This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and... RRP: $335.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptographic Applications of Analytic Number Theory The book introduces new techniques that imply rigorous lower bounds on the com plexity of some number-theoretic and cryptographic problems. It also establishes certain attractive pseudorandom properties of various ... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances to Homomorphic and Searchable Encryption This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view. Homomorphic and searchable encryption are still relatively novel and rapidly evolving areas... RRP: $298.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023 This book presents the proceedings of the International Conference on Applied Cyber Security 2023 (ACS23), held in Dubai on the April 29, containing seven original contributions. Cybersecurity is continuously attracting the world's attention and has... RRP: $335.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Applications for Artificial Intelligence and Digital Forensics in National Security This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape. The digital policing landscape is dynamic and intricate, emanating... RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Data Protection in a Post-Pandemic Society This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT),... RRP: $348.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Public-Key Cryptography - PKC 2023 The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49... RRP: $249.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Autonomous Intelligent Cyber Defense Agent (AICA) This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical... RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Risk Analysis for Intelligent Edge Computing This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and provides an in-depth overview of the basic background in this related field. Practical areas in both... RRP: $337.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Blockchain for Cybersecurity in Cyber-Physical Systems This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research... RRP: $335.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Perfect Secrecy in IoT Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Technological Competence of Arbitrators Arbitration is facing revolutionary changes due to new technologies' irruption into the entire arbitration proceeding. Wide-ranging technical-legal concepts such as e-discovery, e-hearing, cyber-security protocol, e-deliberations, algorithmic... RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Principles and Practice of Blockchains This book provides an essential compilation of relevant and cutting edge academic and industry work on key Blockchain topics. This book concentrates on a wide range of advances related to Blockchains which include, among others, Blockchain principles,... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Modern Approaches in IoT and Machine Learning for Cyber Security This book examines the cyber risks associated with Internet of Things (IoT) and highlights the cyber security capabilities that IoT platforms must have in order to address those cyber risks effectively. The chapters fuse together deep cyber security... RRP: $335.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure and Trusted Cyber Physical Systems This book highlights the latest design and development of security issues and various defences to construct safe, secure and trusted Cyber-Physical Systems (CPS). In addition, the book presents a detailed analysis of the recent approaches to security... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybercomplexity This book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a... RRP: $337.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - EUROCRYPT 2022 The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May -... RRP: $335.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Artificial Intelligence and Security The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full... RRP: $216.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Quantum Key Distribution Networks This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems. The authors use their extensive practical... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Citizen Privacy Framework This book presents the concept of a fuzzy-based recommender system for user account privacy settings that can be used for citizen participation on online political platforms. The elaborated components are exemplarily based on the needs of a political... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Illumination of Artificial Intelligence in Cybersecurity and Forensics This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability... RRP: $216.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Progress in Cryptology - INDOCRYPT 2021 This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021.The 27 full papers included in these proceedings were carefully... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - ASIACRYPT 2021 The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10,... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Machine Learning for Cyber Agents The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking... RRP: $259.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Privacy in Communication Networks This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mobile Multimedia Communications This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Mobile Multimedia Communications, Mobimedia 2021, held in July 2021. Due to COVID-19 pandemic the conference was held virtually. The 66... RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Quantum Computing Environments This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition towards the quantum computing application in various sectors. The book provides a comprehensive insight into the quantum mechanics and... RRP: $259.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Digital Forensics XVII Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital... RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Artificial Intelligence in Cyber Security The book provides a valuable reference for cyber security experts, digital forensic practitioners and network security professionals. In recent years, AI has gained substantial attention from researchers in both academia and industry, and as a result... RRP: $348.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Partially Homomorphic Encryption This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms:... RRP: $216.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Challenges in the IoT and Smart Environments This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer,... RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Topics in Cryptology - CT-RSA 2021 This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2021, CT-RSA 2021, held in San Francisco, CA, USA, in May 2021.*The 27 full papers presented in this volume were carefully reviewed and selected from 100... RRP: $216.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Public-Key Cryptography - PKC 2021 The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was... RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance... RRP: $281.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Smart Log Data Analytics This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel... RRP: $249.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security Technologies for Controlling Pandemics The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely,... RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Sensemaking for Security This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as 'messes'... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Blockchain Security in Cloud Computing This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly... RRP: $281.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Technology Development for Security Practitioners This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Digital Forensic Investigation of Internet of Things (IoT) Devices This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Device-Independent Quantum Information Processing Device-independent quantum cryptography is a method for exchanging secret messages over potentially insecure quantum communication channels, such as optical fibers. In contrast to conventional quantum cryptography, security is guaranteed even if the... RRP: $335.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Linking Sensitive Data This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking sensitive information, concepts and algorithms... RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Wireless Algorithms, Systems, and Applications The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. The conference was planned to take place in... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added New Frontiers in Cryptography This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends such as quantum, blockchain, lightweight, Chaotic and DNA cryptography. Moreover, this book covers cryptography primitives and its usage... RRP: $216.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Challenging Online Propaganda and Disinformation in the 21st Century Disinformation has recently become a salient issue, not just for researchers but for the media, politicians, and the general public as well. Changing circumstances are a challenge for system and societal resilience; disinformation is also a challenge for... RRP: $268.00 Add to Cart The item has been added