This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
AI-Powered Cybersecurity Essentials: Protecting Enterprise Networks explores how modern AI and machine learning safeguard complex, hybrid enterprise environments. The book progresses from cybersecurity and ML foundations to applied defenses: AI-enha...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
The digital forensics research community develops new solutions daily to advance its subfields, including cloud and network forensics and security. However, a substantial amount of such research requires greater experimental rigor. A few works have...Loe edasi...
This book discusses how artificial intelligence, machine learning, and digital technology are being used to re-engineer the manufacturing industry. With a particular emphasis on small- and medium-sized enterprises (SMEs), this book debunks the myth...Loe edasi...
This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
This book provides a structured, practical exploration of modern computer networking concepts and the transformative role of artificial intelligence in cybersecurity. This book begins by introducing the foundational principles of computer networks,...Loe edasi...
Whether youre a student stepping into the world of cybersecurity or a self-taught learner eager to build real-world skills, this book is your gateway to understanding and mastering Linux from both offensive and defensive perspectives. Designed for...Loe edasi...
Explore the full scope of blockchain technology and its relationship with cybersecurity Cybersecurity Implications in Blockchain Architecture delves into the transformative power of blockchain technology and its intricate relation...Loe edasi...
This book provides a systematic and in-depth introduction to machine unlearning (MU) for foundation models, framed through an optimizationmodeldata tri-design perspective and complemented by assessments and applications. As foundation models are con...Loe edasi...
Over the past decade, the security environment has undergone rapid transformation driven by climate change, geopolitical tensions, digitalization, energy transition, and AI integration. These shifts have created a new risk reality where traditional...Loe edasi...
This book provides a comprehensive and up-to-date exploration of data management practices tailored to the needs and challenges of AI technologies. Aimed at masters students, postgraduate trainees, and professionals, this book guides readers through...Loe edasi...
The work grew out of a very practical problem: the AppSec team was drowning in security scanning alerts but still occasionally missed real issues that had been dismissed as false positives. Wanted to present a way not just to tune individual tools,...Loe edasi...
Quantum Computing for Multimedia Processing, Teleportation, and Secure Networks offers a comprehensive exploration of quantum-enhanced technologies across multimedia, communication, and cryptography. Bridging foundational theory with cuttin...Loe edasi...
Máire O'Neill, Francesco Regazzoni, Tim Güneysu, Adrian Waller
Sari: Information Security and Cryptography
(Ilmumisaeg: 13-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031599170)
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as...Loe edasi...
S. S. Iyengar, Kenneth G. Furton, Pronab Mohanty, Naveen Kumar Chaudhary
Sari: Signals and Communication Technology
(Ilmumisaeg: 12-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031980350)
This book explores the transformative role of artificial intelligence (AI) in the field of digital forensics, offering a comprehensive over...Loe edasi...
Secure computation allows any number of mutually distrustful parties to jointly run anarbitrary computation on their combined inputs without compromising their privacy. Securecomputation offers a theoretical solution to a vast array of pro...Loe edasi...
The SAS ecosystem is evolving. Whether you work with SAS Viya or SAS 9, theres never been a better time to dive in and master its full potential. This book guid...Loe edasi...
Are you an experienced cloud security professional looking to upskill or take your career to the next level? The demand for cloud security expertise is skyrocketing and earning a Certified Cloud Security Professional (CCSP) certification is one way t...Loe edasi...
As cyberthreats become more sophisticated and alert volumes rise, security teams need more than just tools—they need strategy, structure, and field-tested guidance. Following the success of the original print edition, this updated digital edition...Loe edasi...
This book is a thorough and practical guide to minimizing personally identifiable information (PII) in every conceivable use case across Finance, Healthcare, Insurance, Legal, Marketing, HR, and Government.Most data protection laws and regu...Loe edasi...
This book explores the transformative impact of artificial intelligence on social engineering and testing, offering a timely and necessary guide for navigating one of the most pressing challenges in modern cybersecurity. AI is not only revolutioni...Loe edasi...
This textbook provides a comprehensive exploration of the transport layer from the perspectives of computer networks and transport layer protocols, delving into the theoretical foundations and emerging application scenarios. It elucidates the princi...Loe edasi...
As artificial intelligence becomes embedded in everything from healthcare diagnostics to financial systems and autonomous vehicles, the stakes for AI security have never been higher. Adversarial AI Threat Response and Secure Model Design is your ess...Loe edasi...
(Ilmumisaeg: 09-Jun-2026, Hardback, Kirjastus: No Starch Press,US, ISBN-13: 9781718504424)
Aspiring hackers will learn foundational programming in C and assembly languages from a veteran hacker and develop the skills to create their own hacking tools.In hacker lore, heavy wizardry means code so close to the metal it feels li...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
AI-Powered Cybersecurity Essentials: Protecting Enterprise Networks explores how modern AI and machine learning safeguard complex, hybrid enterprise environments. The book progresses from cybersecurity and ML foundations to applied defenses: AI-enha...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
The digital forensics research community develops new solutions daily to advance its subfields, including cloud and network forensics and security. However, a substantial amount of such research requires greater experimental rigor. A few works have...Loe edasi...
This book discusses how artificial intelligence, machine learning, and digital technology are being used to re-engineer the manufacturing industry. With a particular emphasis on small- and medium-sized enterprises (SMEs), this book debunks the myth...Loe edasi...
This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
This book provides a structured, practical exploration of modern computer networking concepts and the transformative role of artificial intelligence in cybersecurity. This book begins by introducing the foundational principles of computer networks,...Loe edasi...
Whether youre a student stepping into the world of cybersecurity or a self-taught learner eager to build real-world skills, this book is your gateway to understanding and mastering Linux from both offensive and defensive perspectives. Designed for...Loe edasi...
The autonomous supply chain is the attack surface of the next decade. This is the book that defends it. Download the ASCR Blueprint artifacts directly from the book. Deploy them. Customize them. Use them in client engagements. The blueprint is the b...Loe edasi...
Integrate cybersecurity into TPRM to reduce vendor breach impact, meet DORA and NIST C-SCRM expectations, and monitor fourth-party exposure using SBOM-driven diligence, threat intelligence, and automation. Key Features Design T...Loe edasi...
Secure your critical infrastructure by understanding architectures and risks, hardening legacy and modern systems, protecting data and communications, and building resilient policies through real-world case studies Key Features ...Loe edasi...
Explore the full scope of blockchain technology and its relationship with cybersecurity Cybersecurity Implications in Blockchain Architecture delves into the transformative power of blockchain technology and its intricate relation...Loe edasi...
This book provides a systematic and in-depth introduction to machine unlearning (MU) for foundation models, framed through an optimizationmodeldata tri-design perspective and complemented by assessments and applications. As foundation models are con...Loe edasi...
Over the past decade, the security environment has undergone rapid transformation driven by climate change, geopolitical tensions, digitalization, energy transition, and AI integration. These shifts have created a new risk reality where traditional...Loe edasi...