Integrity and Internal Control in Information Systems isa state-of-the-art book that e...
Database security is one of the classical topics in the research of information system security. ...
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Informat...
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Secu...
Location-based applications refer to those that use location data in a prominent manner. Location...
Motivation for the book Database security has been gaining a great deal of importance as industry...
Motivation for the Book This book seeks to establish the state of the art in the cyber situationa...
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
This book presents a range of cloud computing security challenges and promising solution paths. T...
This book constitutes the refereed proceedings of the 7th International Conference on Information...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group...