02 Apr 2020

Category: Security & Encryption

Computers & Technology

Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), … in Intelligent Systems and Computing (1146)) 

This book presents the outcomes of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), which was dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly those focusing on threat intelligence, analytics, and preventing…

Computer Science

Handbook of Big Data Privacy 

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in…

Computer Science

Passive and Active Measurement: 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020, Proceedings (Lecture Notes in Computer Science (12048)) 

This book constitutes the proceedings of the 21st International Conference on Passive and Active Measurement, PAM 2020, held in Eugene, Oregon, USA, in March 2020. The 19 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They were organized in…

Business & Money

Human Dimensions of Cybersecurity 

“In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D’Alessandro, and Roger Bradbury have produced a book that … shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity ―…

Business & Money

Youtube Algorithms: Hack the Youtube Algorithm | Pro Guide on How to Make Money Online Using your Youtube Channel – Build a Passive Income Business with New Emerging Marketing Strategies 

If you’re new to internet marketing or business in general, I figured it would be a good idea to go over some basic concepts that will help you to understand the big picture of internet marketing. Most people coming into this industry approach Internet marketing…

Computers & Technology

HTTP/2 in Action 

Summary HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Because HTTP/2 has been designed to be easy to transition to, including keeping it backwards compatible, adoption is rapid and expected to increase over the next few…

Computers & Technology

Mathematical Analysis II: Optimisation, Differential Equations and Graph Theory: ICRAPAM 2018, New Delhi, India, October 23–25 (Springer Proceedings in Mathematics & Statistics (307)) 

This book collects original research papers and survey articles presented at the International Conference on Recent Advances in Pure and Applied Mathematics (ICRAPAM), held at Delhi Technological University, India, on 23–25 October 2018. Divided into two volumes, it discusses major topics in mathematical analysis and…

Computers & Technology

Financial Cryptography and Data Security: FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, … (Lecture Notes in Computer Science (11599)) 

This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St. Kitts, St. Kitts and Nevis, in February 2019. The 20 full papers and 4 short papers presented in this book…