Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Auf Grund des langanhaltenden Niedrigzinsniveaus sowie der zusätzlichen Herausforderungen der Corona-Pandemie, stehen Anbieter von Finanzdienstleistungsberatungen (z. B. Banken, Vermögensverwalter) sowie Privatanleger vor finanziellen Problemen. Auf der einen Seite erleiden Banken signifikante Ertragseinbrüche in Geschäftsbereichen, die jahrelang als stabil galten (z. B. Fristentransformation). Auf der anderen Seite stehen Privatanleger der Inflationsgefahr gegenüber, die mit konservativen und niedrig verzinsten Anlagen nicht zu beseitigen ist. Ein möglicher Ausweg, um für beide Seiten finanzielle Linderung zu schaffen, stellen digitale Anlageberatungsservices, die im Fachjargon unter den Begriff Robo-Advice und Robo-Advisory bekannt sind. Dieses Konzept wird aktuell um die Einbindung sog. Krypto- Assets erweitert. Die Arbeit untersucht daher die entscheidungsbestimmenden Faktoren aus Sicht der Privatanleger hinsichtlich der Nutzung eines Krypto-Robo-Advisor.
This book constitutes the refereed post-conference proceedings of the 28th International Workshop on Security Protocols, held in Cambridge, UK, during March 27¿28, 2023.Thirteen papers out of 23 submissions were selected for publication in this book, presented together with the respective transcripts of discussions. The theme of this year's workshop was ¿Humans in security protocols ¿ are we learning from mistakes?¿The topics covered are securing the human endpoint and proving humans correct.
Welcome to "Bitcoin: Mastering the World of Cryptocurrency - Your Ultimate Handbook on Bitcoin". This e-book is your in-depth guide to the intriguing world of Bitcoin and the larger cryptocurrency landscape. This guide is created to meet your needs, whether you're a curious beginner trying to grasp what all the fuss is about, a casual trader looking to expand your knowledge, or an experienced investor looking to stay on the cutting edge of the crypto world.The financial industry is evolving from what we once knew. There are now other ways to carry out transactions, make investments, and store value besides using traditional fiat currencies. A new type of decentralized digital currency built on the blockchain technology was made possible by the 2009 invention of Bitcoin. In addition to being well-known today, Bitcoin also sparked a technological revolution and gave rise to dozens of alternative cryptocurrencies.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security ¿ investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. This book, Advances in Digital Forensics XIX, is the nineteenth volume in the annual series produced by the IFIP Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book presents original research results and innovative applications in digital forensics. Also, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. This volume contains fourteen revised and edited chapters based on papers presented at the Nineteenth IFIP WG 11.9 International Conference on Digital Forensics held at SRI International in Arlington, Virginia, USA on January 30-31, 2023. A total of 24 full-length papers were submitted for presentation at the conference.
This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies.Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids.It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementationThis publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services.Chapter 10 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
This book presents applications of blockchain technologies to foster sustainable development in the textile and clothing supply chain. The concept of Textiles and Fashion Sustainability has grown to a wider extent today. Among the list of items to achieve Sustainability in Textiles and Fashion, the key element is the traceability of supply chains in terms of mapping and tracing the entire supply chain to ensure sustainable supply chain management. Reliable and transparent, efficient data is one of the crucial requirements for Textiles and Fashion Sustainability in today's advanced industrial context and this is possible in this advanced era by various technological advancements such as Block chain technologies. These days one can see a widespread application of blockchain technology in the Textiles and Clothing sector. The core competencies of blockchain technology namely transparency, data auditability, privacy, value transfer, and process efficiency and automation are very much essential for achieving the multifold objectives under the theme Textiles and Fashion Sustainability.
"Securing Information in the Digital Age" is a comprehensive guide that addresses the increasingly complex challenges of information security in today's hyper-connected world. As society delves deeper into the digital realm, safeguarding personal, corporate, and governmental information becomes paramount. This book seamlessly blends foundational principles with advanced techniques, offering readers a well-rounded understanding of the modern cybersecurity landscape.Key highlights of the book include:Digital Foundations: An overview of the digital infrastructure underpinning today's world, from internet protocols to cloud computing dynamics.Threat Landscape: A detailed look at the myriad threats facing digital information, including hackers, malware, ransomware, and state-sponsored cyberattacks.Human Element: Exploration of the social engineering tactics, like phishing and baiting, and the psychology behind these methods.Defensive Measures: A deep dive into tools, techniques, and best practices for information security, covering firewalls, encryption, two-factor authentication, and more.Beyond the Technical: Emphasizing the importance of organizational culture, training, and policies in establishing a robust cybersecurity posture.Legal and Ethical Aspects: Insights into the evolving legal landscape surrounding digital information, data breaches, and the ethical considerations of privacy.Future of Information Security: Predictions and considerations for the next wave of challenges and opportunities in digital security, from quantum computing to the Internet of Things."Securing Information in the Digital Age" is more than just a technical manual. It presents a holistic view of digital security, emphasizing the integration of technology, people, and processes to achieve robust defense mechanisms. Perfect for IT professionals, business leaders, policymakers, and anyone keen on understanding and navigating the intricacies of protecting information in an ever-evolving digital world.
This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.
This edited collection of essays brings together scholars across disciplines who consider the collaborative work of John Matthews Manly and Edith Rickert, philologists, medievalists and early modernists, cryptologists, and education reformers. These pioneers crafted interdisciplinary partnerships as they modeled and advocated for cooperative alliances at every level of their work and in all their academic relationships. Their extensive network of intellectual partnerships made possible groundbreaking projects, from the eight-volume Text of the Canterbury Tales (1940) to the deciphering of the Waberski Cipher, yet, except for their Chaucer work, their many other accomplishments have received little attention. Collaborative Humanities Research and Pedagogy not only surveys the rich range of their work but also emphasizes the transformative intellectual and pedagogical benefits of collaboration.
Through the application of cutting-edge techniques like Big Data, Data Mining, and Data Science, it is possible to extract insights from massive datasets. These methodologies are crucial in enabling informed decision-making and driving transformative advancements across many fields, industries, and domains. This book offers an overview of latest tools, methods and approaches while also highlighting their practical use through various applications and case studies.
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.
Explore the role ChatGPT can play in business, including operations, marketing, sales, and delivery. This concise book illustrates how ChatGPT is changing the way individuals interact with machines and how you can take advantage of its capabilities for business.The book starts with an overview of ChatGPT and its impact in the realm of of conversational AI. You will then dive into the technical aspects of ChatGPT and gain an understanding of how machine learning algorithms and natural language processing work in the background. Various business applications of ChatGPT are then discussed, followed by how it can get integrated into your business operations. To wrap things up, you will gain insight into the data and privacy elements that need to be considered while using ChatGPT, and how to maintain its integrity.After completing this book, you will understand the ChatGPT framework and how to integrate it into your own ventures. What You Will LearnUnderstand the various technologies and techniques utilized in ChatGPTGain insight into the future of human-machine interactionAnalyze the advantages and disadvantages of ChatGPT for your industryExplore the ethical implications of using AI Who This Book Is ForTech enthusiasts who are passionate about artificial intelligence (AI), machine learning, and human-machine interaction.
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.
Take your penetration testing career to the next level by discovering how to set up and exploit cost-effective hacking lab environments on AWS, Azure, and GCPKey FeaturesExplore strategies for managing the complexity, cost, and security of running labs in the cloudUnlock the power of infrastructure as code and generative AI when building complex lab environmentsLearn how to build pentesting labs that mimic modern environments on AWS, Azure, and GCPPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe significant increase in the number of cloud-related threats and issues has led to a surge in the demand for cloud security professionals. This book will help you set up vulnerable-by-design environments in the cloud to minimize the risks involved while learning all about cloud penetration testing and ethical hacking.This step-by-step guide begins by helping you design and build penetration testing labs that mimic modern cloud environments running on AWS, Azure, and Google Cloud Platform (GCP). Next, you'll find out how to use infrastructure as code (IaC) solutions to manage a variety of lab environments in the cloud. As you advance, you'll discover how generative AI tools, such as ChatGPT, can be leveraged to accelerate the preparation of IaC templates and configurations. You'll also learn how to validate vulnerabilities by exploiting misconfigurations and vulnerabilities using various penetration testing tools and techniques. Finally, you'll explore several practical strategies for managing the complexity, cost, and risks involved when dealing with penetration testing lab environments in the cloud.By the end of this penetration testing book, you'll be able to design and build cost-effective vulnerable cloud lab environments where you can experiment and practice different types of attacks and penetration testing techniques.What you will learnBuild vulnerable-by-design labs that mimic modern cloud environmentsFind out how to manage the risks associated with cloud lab environmentsUse infrastructure as code to automate lab infrastructure deploymentsValidate vulnerabilities present in penetration testing labsFind out how to manage the costs of running labs on AWS, Azure, and GCPSet up IAM privilege escalation labs for advanced penetration testingUse generative AI tools to generate infrastructure as code templatesImport the Kali Linux Generic Cloud Image to the cloud with easeWho this book is forThis book is for security engineers, cloud engineers, and aspiring security professionals who want to learn more about penetration testing and cloud security. Other tech professionals working on advancing their career in cloud security who want to learn how to manage the complexity, costs, and risks associated with building and managing hacking lab environments in the cloud will find this book useful.Table of ContentsGetting Started with Penetration Testing Labs in the CloudPreparing Our First Vulnerable Cloud Lab EnvironmentSucceeding with Infrastructure as Code Tools and StrategiesSetting Up Isolated Penetration Testing Lab Environments on GCPSetting Up Isolated Penetration Testing Lab Environments on AzureSetting Up Isolated Penetration Testing Lab Environments on AWSSetting Up an IAM Privilege Escalation LabDesigning and Building a Vulnerable Active Directory LabRecommended Strategies and Best Practices
Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods used by attackers to harvest dataUnderstand the evolving implications of social engineering on social networksImplement effective defensive strategies to mitigate the probability and impact of social engineering attacksPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionSocial engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks.You'll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques.By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.What you will learnGrasp the psychological concepts and principles used in social engineering attacksDistinguish the different types of social engineering attacksExamine the impact of social engineering on social networksFind out how attackers leverage OSINT tools to perform more successful attacksWalk through the social engineering lifecycleGet a glimpse of the capabilities of Social Engineering Toolkit (SET)Who this book is forThis book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat.Table of ContentsThe Psychology Behind Social EngineeringUnderstanding Social EngineeringCommon Scam AttacksTypes of Social Engineering AttacksEnhanced Social Engineering AttacksSocial Engineering and Social Network AttacksAI-Driven Techniques in Enhanced Social Engineering AttacksThe Social Engineering Toolkit (SET)Understanding the Social Engineering LifecycleDefensive Strategies for Social EngineeringApplicable Laws and Regulations for Social Engineering
Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language). Experts in information security and analysis guide you through what it takes to automate your approach to risk assessment and remediation, speeding up detection time while reducing manual work using KQL. This accessible and practical guidedesigned for a broad range of people with varying experience in KQLwill quickly make KQL second nature for information security. Solve real problems with Kusto Query Language and build your competitive advantage: Learn the fundamentals of KQLwhat it is and where it is used Examine the anatomy of a KQL query Understand why data summation and aggregation is important See examples of data summation, including count, countif, and dcount Learn the benefits of moving from raw data ingestion to a more automated approach for security operations Unlock how to write efficient and effective queries Work with advanced KQL operators, advanced data strings, and multivalued strings Explore KQL for day-to-day admin tasks, performance, and troubleshooting Use KQL across Azure, including app services and function apps Delve into defending and threat hunting using KQL Recognize indicators of compromise and anomaly detection Learn to access and contribute to hunting queries via GitHub and workbooks via Microsoft Entra ID
In the age of social media dominance, a staggering amount of textual data floods our online spaces daily. While this wealth of information presents boundless opportunities for research and understanding human behavior, it also poses substantial challenges. The sheer volume of data overwhelms traditional processing methods, and harnessing its potential requires sophisticated tools. Furthermore, the need for ensuring data security and mitigating risks in the digital realm has never been more pressing. Academic scholars, researchers, and professionals grapple with these issues daily, seeking innovative solutions to unlock the true value of multimedia data while safeguarding privacy and integrity. Recent Advancements in Multimedia Data Processing and Security: Issues, Challenges, and Techniques is a groundbreaking book that serves as a beacon of light amidst the sea of data-related challenges. It offers a comprehensive solution by bridging the gap between academic research and practical applications. By delving into topics such as deep learning, emotion recognition, and high-dimensional text clustering, it equips scholars and professionals with the innovative tools and techniques they need to navigate the complex landscape of multimedia data.
'Rinsed is a triumph. If you want to understand how the chaotic world around us really works, read this book!'MILES JOHNSON, AUTHOR OF CHASING SHADOWS'A riveting look at not only the nuts and bolts of cons and crimes but the techniques detectives use to stalk cyber criminals'FINANCIAL TIMES'Gripping'THE ECONOMIST For as long as people have been stealing money, there has been an industry ready to wash it. But what happened when our economy went digital? How does the global underworld wash its dirty money in the Internet age?Rinsed reveals how organized crooks have joined forces with the world's most sophisticated cybercriminals. The result: a vast virtual money-laundering machine too intelligent for most authorities to crack. Through a series of jaw-dropping cases and interviews with insiders at all levels of the system, Geoff White shows how thieves are uniting to successfully get away with the most atrocious crimes on an unprecedented scale.The book follows money from the outrageous luxury of Dubai hotels to sleepy backwaters of coastal Ireland, from the backstreets of Nigeria to the secretive zones of North Korea, to investigate this new cyber supercartel. Through first-hand accounts from the victims of their devastating crimes, White uncovers the extraordinary true story of hi-tech laundering - and exposes its terrible human cost.'Rinsed is as twisty, colourful and terrifyingly eye-opening as the people White investigates. You'll never look at wealth, technology and crime in the same way'CARA MCGOOGAN, AUTHOR OF THE POISON LINE'A gripping look at the battle between cops and criminals on the new frontier of financial crime'BRADLEY HOPE, CO-AUTHOR OF BILLION DOLLAR WHALE
This book constitutes the proceedings of the 6th International Conference on Blockchain, ICBC 2023, held as part of the Services Conference Federation, SCF 2023, held in Honolulu, HI, USA, during September 23¿26, 2023. The 9 full papers presented in this book were carefully reviewed and selected from 18 submissions. The conference focuses on new blockchain architecture, platform constructions, blockchain development, and blockchain services technologies as well as standards and blockchain services innovation lifecycle, including enterprise modeling, business consulting, solution creation, services orchestration, services optimization, services management, services marketing, and business process integration and management.
This book constitutes the proceedings of 25th International Symposium, SSS 2023, in Jersey City, NJ, USA, in October 2023.The 32 full papers presented together with 8 short papers were carefully reviewed and selected from 78 submissions. The conference was organized into five tracks reflecting major trends related to the conference: (i) Track A. Self-stabilizing Systems:Theory and Practice, (ii) Track B. Distributed and Concurrent Computing:Foundations, Fault-Tolerance and Scalability, (iii) Track C. Cryptogrophy and Security, (iv) Track D. Dynamic, Mobile and Nature-Inspired Computing MobileAgents, (v) and Distributed Databases.
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT. In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares.This book is organized in two parts. The first part studie s information-theoretic cryptography and the promise it holds for cryptography in IoT. The second part separately discusses combinatorial and Boolean cryptography, and then presents the hybrid combinatorial-Boolean model for perfect secrecy in IoT.
This book examines whether the integration of edge intelligence (EI) and blockchain (BC) can open up new horizons for providing ubiquitous intelligent services. Accordingly, the authors conduct a summarization of the recent research efforts on the existing works for EI and BC, further painting a comprehensive picture of the limitation of EI and why BC could benefit EI. To examine how to integrate EI and BC, the authors discuss the BC-driven EI and tailoring BC to EI, including an overview, motivations, and integrated frameworks. Finally, some challenges and future directions are explored. The book explores the technologies associated with the integrated system between EI and BC, and further bridges the gap between immature BC and EI-amicable BC.Explores the integration of edge intelligence (EI) and blockchain (BC), including their integrated motivations, frameworks and challenges;Presents how BC-driven EI can realize computing-power management, data administration, and model optimization;Describes how to tailor BC to better support EI, including flexible consensus protocol, effective incentive mechanism, intellectuality smart contract, and scalable BC system tailoring;Presents some key research challenges and future directions for the integrated system.
This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs.
Impossible Monsters is the captivating story of the discovery of the dinosaurs and how it upended our understanding of the origins of the world.'An astonishing book about an extraordinary subject' PETER FRANKOPAN'As thrilling as it is sweeping' TOM HOLLAND'This book dazzles in its originality . . . a triumph' SATHNAM SANGHERAIn 1811, a twelve-year-old girl uncovered some strange-looking bones in Britain's southern shoreline. They belonged to no known creature and were buried beneath a hundred feet of rock. Over the next two decades, as several more of these 'impossible monsters' emerged from the soil, the leading scientists of the day were forced to confront a profoundly disturbing possibility: the Bible, as a historical account of the Earth's origins, was wildly wrong.This is the dramatic story of the crisis that engulfed science and religion when we discovered the dinosaurs. It takes us into the lives and minds of the extraordinary men and women who made these heretical discoveries, those who resisted them, as well as the pioneering thinkers, Darwin most famous among them, who took great risks to construct a new account of the earth's and mankind's origins.Impossible Monsters is the riveting story of a group of people who not only thought impossible things but showed them to be true. In the process they overturned the literal reading of the Bible, liberated science from the authority of religion and ushered in the secular age.'Truly marvellous ... an intellectual thriller' RICHARD HOLMES'A stunning work ... of surprises and revelations' STEVE BRUSATTE
Unveil the realm of social manipulation in "The Social Hacking Dictionary" by Black Hat Kathy. This essential reference text is a guide for security professionals and the vigilant, revealing the tactics used to exploit human behavior. With each entry, explore three real-world examples that expose the art of social engineering. From targeted phishing to trust manipulation, this comprehensive dictionary equips you with insights into the methods that threaten personal and organizational security. Delve into the dark corners of deception and stay ahead of potential threats, arming yourself with knowledge to navigate the complexities of our interconnected world.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.