Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin act...Loe edasi...
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity, both new opportunities and hazards are emerging. Cryptocurrencies are no longer a fringe idea; they are now a component of i...Loe edasi...
This book explores deep learning as a next-generation approach to online payment fraud detection in the face of increasingly complex and adaptive threats. Traditional rule-based or shallow learning methods are no longer sufficient. Through ten focus...Loe edasi...
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and comp...Loe edasi...
This book demonstrates how quantitative resilience methodologies can be applied to a wide range of space systems as an extension of conventional systems engineering processes. It addresses the full spectrum of threats facing modern space systems a...Loe edasi...
This book takes the complex and highly topical theme of AI-driven surveillance and reduces it to simple but important questions. Drawing upon the authors professional experience as UKs first joint Biometrics and Surveillance Camera Commissioner, the...Loe edasi...
This book integrates innovative theoretical research with practical application, providing a comprehensive and in-depth guide for practitioners, researchers in the field of intelligent manufacturing, and readers from all walks of life who are curiou...Loe edasi...
This book presents advanced Dynamic State Estimation (DSE) methodologies across three power system classes: quasi-steady power systems, synchronous-generator-based multi-machine systems and renewable energy microgrids including unconventional measur...Loe edasi...
The book Safety Strategy for Intelligent Transport Telematics Systems is a monograph devoted to one of the key challenges of modern transport - the security of telematics systems. In this sense, the publication aligns with current research trend...Loe edasi...
Generative AI for Cybersecurity explores how rapidly evolving generative models are reshaping modern digital defense. As organizations become more interconnected and data-driven, traditional cybersecurity measures are increasingly challenged by ad...Loe edasi...
This proceedings volume is a collection of 35 chapters presented at the Second International Conference on Artificial Intelligence, Machine Learning and Intelligent Systems (ICAMS-2025), held at the National Institute of Technology Hamirpur, Himac...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
In todays data-driven world, securing sensitive information while enabling collaboration is crucial for every organization. This book empowers you to unlock the full potential of Salesforces sharing and visibility architecture, balancing access and...Loe edasi...
In the age of continuous delivery and microservices, the difference between resilient software and production chaos lies in proactive fault detection. This book shows how to harness the power of predictive analytics and DevSecOps to find weaknesses...Loe edasi...
Blockchain Sharding: Theory and Practice provides a comprehensive exploration of one of the most promising scalability solutions for blockchain systems. This book bridges the gap between foundational theories and real-world implementations, offering...Loe edasi...
This book explores sharenting—the widespread practice of parents or caregivers sharing information about their children online—and explores how this pervasive digital practice is reshaping childhood, parenting, and family life in a networke...Loe edasi...
In a digital world saturated with synthetic media and AI-shaped narratives, the quest for trustworthy public information has never been more urgent. Governing Public Information in the Age of AI explores how blockchain can strengthen the integrity o...Loe edasi...
This book discusses how artificial intelligence, machine learning, and digital technology are being used to re-engineer the manufacturing industry. With a particular emphasis on small- and medium-sized enterprises (SMEs), this book debunks the myth...Loe edasi...
This book outlines a practical framework for implementing a resilient circular economy principle across ten major industries in a developed country. It focuses on integrating circular thinking into supply chain management and applying digital transf...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
The book explores how universities can harness the power of artificial intelligence (AI) while safeguarding privacy, equity, and academic values. Focusing on China’s rapidly evolving higher education sector, this book examines the op...Loe edasi...
Quantum informatics for novel therapeutics is a field-guide to the new healthcare stackwhere quantum computing, AI, cybersecurity, and biomedical data science converge to change what we can discover, protect, and deliver. It takes readers from the e...Loe edasi...
This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
AI-Powered Cybersecurity Essentials: Protecting Enterprise Networks explores how modern AI and machine learning safeguard complex, hybrid enterprise environments. The book progresses from cybersecurity and ML foundations to applied defenses: AI-enha...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security. In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental improve...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security.In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental i...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
The digital forensics research community develops new solutions daily to advance its subfields, including cloud and network forensics and security. However, a substantial amount of such research requires greater experimental rigor. A few works have...Loe edasi...
Disinformation has become one of the most dangerous threats to modern businesses. In this book, communications expert Uwe Wolff reveals how false narratives, digital smear campaigns, deepfakes, bots and state-sponsored influence operations are used...Loe edasi...
Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin act...Loe edasi...
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity, both new opportunities and hazards are emerging. Cryptocurrencies are no longer a fringe idea; they are now a component of i...Loe edasi...
This book explores deep learning as a next-generation approach to online payment fraud detection in the face of increasingly complex and adaptive threats. Traditional rule-based or shallow learning methods are no longer sufficient. Through ten focus...Loe edasi...
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and comp...Loe edasi...
This book demonstrates how quantitative resilience methodologies can be applied to a wide range of space systems as an extension of conventional systems engineering processes. It addresses the full spectrum of threats facing modern space systems a...Loe edasi...
Readers of all backgrounds will learn about cryptographys role in protecting everyday digital interactions – from buying a coffee to texting a friend – from two security experts.This cybersecurity book for beginners and experts alike...Loe edasi...
This book takes the complex and highly topical theme of AI-driven surveillance and reduces it to simple but important questions. Drawing upon the authors professional experience as UKs first joint Biometrics and Surveillance Camera Commissioner, the...Loe edasi...
This book integrates innovative theoretical research with practical application, providing a comprehensive and in-depth guide for practitioners, researchers in the field of intelligent manufacturing, and readers from all walks of life who are curiou...Loe edasi...
This book presents advanced Dynamic State Estimation (DSE) methodologies across three power system classes: quasi-steady power systems, synchronous-generator-based multi-machine systems and renewable energy microgrids including unconventional measur...Loe edasi...
The book Safety Strategy for Intelligent Transport Telematics Systems is a monograph devoted to one of the key challenges of modern transport - the security of telematics systems. In this sense, the publication aligns with current research trend...Loe edasi...
Generative AI for Cybersecurity explores how rapidly evolving generative models are reshaping modern digital defense. As organizations become more interconnected and data-driven, traditional cybersecurity measures are increasingly challenged by ad...Loe edasi...
This proceedings volume is a collection of 35 chapters presented at the Second International Conference on Artificial Intelligence, Machine Learning and Intelligent Systems (ICAMS-2025), held at the National Institute of Technology Hamirpur, Himac...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
In todays data-driven world, securing sensitive information while enabling collaboration is crucial for every organization. This book empowers you to unlock the full potential of Salesforces sharing and visibility architecture, balancing access and...Loe edasi...
In the age of continuous delivery and microservices, the difference between resilient software and production chaos lies in proactive fault detection. This book shows how to harness the power of predictive analytics and DevSecOps to find weaknesses...Loe edasi...
Blockchain Sharding: Theory and Practice provides a comprehensive exploration of one of the most promising scalability solutions for blockchain systems. This book bridges the gap between foundational theories and real-world implementations, offering...Loe edasi...
This book explores sharenting—the widespread practice of parents or caregivers sharing information about their children online—and explores how this pervasive digital practice is reshaping childhood, parenting, and family life in a networke...Loe edasi...
In a digital world saturated with synthetic media and AI-shaped narratives, the quest for trustworthy public information has never been more urgent. Governing Public Information in the Age of AI explores how blockchain can strengthen the integrity o...Loe edasi...