We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 154 results
  1. The Business of Hacking Creating, Developing, and Maintaining an Effective Penetration Testing Team

    There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with...
    Michael Butler, Jacob G. Oakley
    Book 2024
  2. Managing IT Service Security Methods and Recipes for User Organizations and Providers Along the Supply Chain

    This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject...

    Eberhard von Faber
    Book 2024
  3. Android Malware Detection and Adversarial Methods

    The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on...

    Weina Niu, Xiaosong Zhang, ... Jiacheng Gong
    Book 2024
  4. Digital Transformation in the Viral Age 21st Workshop on e-Business, WeB 2022, Copenhagen, Denmark, December 10, 2022, Revised Selected Papers

    This book constitutes revised selected papers from the 21st Workshop on e-Business, WeB 2022, which took place virtually on December 10, 2022.

    The...

    Abhishek Kathuria, Prasanna P. Karhade, ... Devina Chaturvedi in Lecture Notes in Business Information Processing
    Conference proceedings 2024
  5. Selected Areas in Cryptography 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24–26, 2022, Revised Selected Papers

    This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held...

    Benjamin Smith, Huapeng Wu in Lecture Notes in Computer Science
    Conference proceedings 2024
  6. Advances in Cryptology – EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part II

    The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and...

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science
    Conference proceedings 2024
  7. IT Infrastructure Security and Resilience Solutions

    Embark on a comprehensive journey into the intricate world of IT infrastructure, with an in-depth look into the transformational role of secure,...

    Ralf Süß, Yannik Süß
    Book 2024
  8. Advances in Cryptology – EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III

    The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and...

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science
    Conference proceedings 2024
  9. Advances in Cryptology – EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part I

    The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and...

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science
    Conference proceedings 2024
  10. Advances in Cryptology – EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part V

    The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and...

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science
    Conference proceedings 2024
  11. Advances in Cryptology – EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VI

    The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and...

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science
    Conference proceedings 2024
  12. Advances in Cryptology – EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV

    The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and...

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science
    Conference proceedings 2024
  13. Advances in Cryptology – EUROCRYPT 2024 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VII

    The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and...

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science
    Conference proceedings 2024
  14. Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications

    This book focuses on the sustainable security practices in the domain of blockchain, quantum, and post-quantum technologies dealing with the...
    Adarsh Kumar, Neelu Jyothi Ahuja, ... Surbhi Bhatia Khan in Contributions to Environmental Sciences & Innovative Business Technology
    Book 2024
  15. Blockchains A Handbook on Fundamentals, Platforms and Applications

    This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The...
    Sushmita Ruj, Salil S. Kanhere, Mauro Conti in Advances in Information Security
    Book 2024
  16. Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I

    The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS...
    Christina Pöpper, Lejla Batina in Lecture Notes in Computer Science
    Conference proceedings 2024
  17. Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II

    The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS...
    Christina Pöpper, Lejla Batina in Lecture Notes in Computer Science
    Conference proceedings 2024
  18. Applied Cryptography and Network Security 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III

    The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS...
    Christina Pöpper, Lejla Batina in Lecture Notes in Computer Science
    Conference proceedings 2024
  19. Multimedia Watermarking Latest Developments and Trends

    Multimedia watermarking is a key ingredient for integrity verification, transaction tracking, copyright protection, authentication, copy control, and...

    Aditya Kumar Sahu
    Book 2024
  20. Selected Areas in Cryptography – SAC 2023 30th International Conference, Fredericton, Canada, August 14–18, 2023, Revised Selected Papers

    This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography, SAC 2023, held in Fredericton,...
    Claude Carlet, Kalikinkar Mandal, Vincent Rijmen in Lecture Notes in Computer Science
    Conference proceedings 2024
Did you find what you were looking for? Share feedback.