Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Lee masThis book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) ...
Lee masThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
Lee masThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
Lee masThis book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...
Lee masSecurity is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent ...
Lee masThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
Lee masThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
Lee masCyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. ...
Lee masThis book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...
Lee masOffers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...
Lee masThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Lee masThis book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...
Lee masThis book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...
Lee masThis book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...
Lee masCovers all areas of human–computer interaction and human factors in cybersecurity Includes information for IT specialists, ...
Lee masGives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
Lee masThis updated edition of Information Assurance: Security in the Information Environment was written to help IT managers and ...
Lee masThis book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...
Lee masThis book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...
Lee mas