Search
Search Results
-
IT-Forensik Ein Grundkurs
Die IT-Forensik hat zum Ziel, Cybercrime-Vorfälle wie z.B. Hacker-Angriffe, Phishing-Attacken oder einen Daten-Diebstahl aufzuklären. Dazu werden...
-
Digital Shakedown The Complete Guide to Understanding and Combating Ransomware
This book is a comprehensive review of ransomware that covers ransomware from every angle. It presents origins, components, purpose, impacts,...
-
Law Enforcement Strategies for Disrupting Cryptomarkets A Practical Guide to Network Structure, Trust Dynamics, and Agent-Based Modelling Approaches
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal...
-
The Business of Hacking Creating, Developing, and Maintaining an Effective Penetration Testing Team
There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with... -
Dive into Misinformation Detection From Unimodal to Multimodal and Multilingual Misinformation Detection
This book delivers a brief introduction to misinformation, and various novel approaches for solving misinformation detection problems. It considers...
-
The Art of Cyber Warfare Strategic and Tactical Approaches for Attack and Defense in the Digital Age
The Art of Cyber Warfareexplores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts... -
Cyber Crisis Management Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation
Cyber-Attacken und IT-Pannen bedrohen jede Organisation. Die Zwischenfälle häufen sich und bilden oft den Auftakt zu komplexen, existenzgefährdenden... -
Manipulationen und Moneten – Datentrickserei im digitalen Zeitalter
Schummeln ist neben Schwindeln mit Sicherheit Teil menschlichen Lebens. Es fängt schon im Kindergarten an mit Klauen von Spielsachen oder von... -
Adversarial Multimedia Forensics
This book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving...
-
AI Embedded Assurance for Cyber Systems
The rapid growth and reliance on cyber systems have permeated our society, government, and military which is demonstrated in this book. The authors...
-
Computer Hacking Eine Einführung zur Verbesserung der Computersicherheit in komplexen IT-Infrastrukturen
Technische Maßnahmen, die es Cyberangreifern schwer machen, dienen zur Abschreckung, weil Hacker immer nur so hoch springen, wie sie müssen. Bei...
-
Krisenfall Ransomware Strategien für Wiederaufbau, Forensik und Kommunikation
Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige...
-
Towards new e-Infrastructure and e-Services for Developing Countries 14th EAI International Conference, AFRICOMM 2022, Zanzibar, Tanzania, December 5-7, 2022, Proceedings
This book constitutes the refereed proceedings of the 14th EAI International Conference on Towards new e-Infrastructure and e-Services for Developing... -
Die Kunst des Cyberkrieges Strategische und taktische Vorgehensweisen für Angriff und Verteidigung im digitalen Zeitalter
Die Kunst des Cyberkriegesgreift die strategischen und taktischen Vorgehensweisen für Angriff und Verteidigung im digitalen Zeitalter auf. Dazu... -
Digital Sovereignty in Cyber Security: New Challenges in Future Vision First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers
This book constitutes papers presented during the workshop session titled “CyberSec4Europe - Research to Innovation: Common Research Framework on... -
Bitcoin und Blockchain Vom Scheitern einer Ideologie und dem Erfolg einer revolutionären Technik
Der Erfolg von Kryptowährungen und der Blockchain-Technologie stellt unsere Gesellschaft vor völlig neue Herausforderungen. Schon in naher Zukunft... -
Firewalls Don't Stop Dragons A Step-by-Step Guide to Computer Security and Privacy for Non-Techies
Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular,... -
Cybersecurity in Morocco
This SpringerBrief contains eight chapters and presents an overview of the evolution of the Moroccan Cybersecurity Strategy. It also draws attention... -
Cyber and the City Securing London’s Banks in the Computer Age
Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is...
-
Reinforcement Learning with Hybrid Quantum Approximation in the NISQ Context
This book explores the combination of Reinforcement Learning and Quantum Computing in the light of complex attacker-defender scenarios. Reinforcement...