Public-Key Cryptography - Pkc 2025
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in R繪ros, Norway, during May 12-15, 2025.The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.
Public-Key Cryptography - Pkc 2025
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in R繪ros, Norway, during May 12-15, 2025.The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.
Public-Key Cryptography - Pkc 2025
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in R繪ros, Norway, during May 12-15, 2025.The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.
Public-Key Cryptography - Pkc 2025
The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in R繪ros, Norway, during May 12-15, 2025. The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.
The ChatGPT Revolution
Delving into ChatGPT's architecture and ability to generate human-like text, chapters go beyond technical explanations, exploring the factors contributing to ChatGPT's widespread adoption and its significance in society and industry. The work showcases how ChatGPT has transformed conversational experiences, revolutionizing customer service, streamlining business processes, and enhancing user engagement across various domains. Authors address the potential pitfalls and ethical concerns associated with ChatGPT. They delve into bias, misinformation, and the potential amplification of harmful content that may arise, as well as revealing insights into responsible AI practices, transparency, and accountability, emphasizing the importance of mitigating these risks and ensuring fairness in AI-driven conversations. Thoroughly examining the impact of ChatGPT on the workforce and the potential for job displacement, the need for upskilling and reskilling, and the importance of balanced integration of human oversight in chatbot interactions, the concept of collaborative human-AI systems is explored, where ChatGPT works alongside humans to enhance conversation quality and foster trust. The ChatGPT Revolution is essential reading for AI researchers and academics interested in the technical intricacies of ChatGPT, industry professionals in AI and NLP seeking practical insights for real-world applications, and ethics and responsible AI practitioners focusing on mitigating ethical concerns.
Salesforce Security
Security breaches and data leaks can spell disaster for businesses, jeopardizing finances and eroding customer trust. Whether you're part of a multinational corporation or a burgeoning startup, ensuring your Salesforce instance is fortified against malicious cyber threats is crucial. Salesforce Security: An Admin's Guide is your comprehensive and lighthearted roadmap to secure your implementation--and your customers' data. Dive deep into the realm of cybersecurity with this engaging guide, where you'll unravel powerful concepts like the CIA triad and the Zero Trust model. Discover how to configure Salesforce settings for optimal security and use artificial intelligence to code securely, practices that will keep your implementations safe and scalable. This book equips you with the skills establish yourself as a security expert, designing scalable sharing models, implementing the principle of least privilege, encrypting sensitive information, and selecting robust authentication systems. With detailed, step-by-step instructions, you'll learn to manage users efficiently, control record access meticulously, and optimize permissions through profiles and permission sets-all while establishing standard operating procedures for audits that are both effective and straightforward. Beyond the basics, you'll learn about persona mapping and building trust with your super users. You'll learn about vulnerabilities (and their mitigations) for Salesforce experience cloud and the Salesforce Mobile app. Each chapter is peppered with real-world use cases and practical examples that empower you to apply these techniques effortlessly to your own Salesforce environment. By the end of this transformative journey, you'll not only possess foundational knowledge but also emerge as a Salesforce security expert ready to elevate your career. Impress managers and delight customers while ensuring your organization stands resilient against cyber threats. What You'll Discover: Learn security principles through the CIA triad and Zero Trust framework.Design least privilege sharing models and access systems that scale with your business.Ensure security for Salesforce mobile using enhanced security controls.Secure experience sites, integrations, and platform features effectively.Leverage innovative Salesforce AI tools to write secure, scalable code.Step into the future of Salesforce security-your journey starts here!
CompTIA CASP+ (CAS-005) Certification Guide
DESCRIPTION CompTIA Advanced Security Practitioner (CASP+) is a vendor-neutral security certification. It validates advanced-level core technical skills, including active management of security engineering, operations, incidents, handling enterprise-level risk assessments, and IT governance. This book navigates the critical domains of the CASP+ exam. It begins by establishing the business and industry context influencing IT security, followed by organizational governance, risk management, and crucial risk mitigation strategies. You will understand enterprise risk measurement, principles of secure architecture, and the practical application of security controls across networks, hosts, storage, and the evolving landscape of IoT and cloud technologies. Furthermore, this book explores application vulnerabilities, the importance of continuous security research, securing communication and collaboration, implementing cryptographic techniques, and mastering IAM. Finally, it covers the vital areas of security operations, incident response, the integration of diverse IT systems, and security considerations in the technology lifecycle; it also includes practice exams to reinforce learning.This new edition provides a broader coverage of organizational security, including governance, risk, and compliance, as well as a more detailed examination of cloud security and its integration with virtualization. By the end of this book, you will gain an understanding of advanced security concepts and practical techniques, empowering you to confidently tackle the CASP+ certification exam and apply expert-level security skills to protect and defend complex organizational environments.WHAT YOU WILL LEARN● LIntegrate hosts/networks/storage/applications/cloud; manage security lifecycle; assess CASP+ skills via mock exams.● Analyze real-world scenarios involving cloud, virtualization, networks, servers, applications, and end-user systems. ● Core technical knowledge and hands-on skills to design, implement, and integrate security solutions across enterprise environments.● This edition brings enhanced practical learning with the inclusion of a second comprehensive CASP+ skill assessment exam.WHO THIS BOOK IS FORThis book is for security architects, senior security engineers, security leads, and security practitioners seeking to advance their expertise in designing and managing complex enterprise security landscapes. Readers should possess basic knowledge of foundational security principles and IT infrastructure concepts before reading this book.
Identity Security for Software Development
Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help. In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn: What developers need to know about managing secrets and identity to build safer apps What machine identities, secrets, and credentials are--and how to secure them How to secure the software supply chain to build safer apps How identity security fits into modern software development practices
Mastering AI for Healthcare
Harness AI-led Revolution to Deliver Smarter, Faster, and Better Healthcare. Book DescriptionArtificial Intelligence is rapidly becoming indispensable in modern healthcare-reshaping how we diagnose, treat, and deliver care. Mastering AI for Healthcare offers a clear, structured journey through this transformation, helping readers understand the critical role AI plays in improving clinical outcomes and operational efficiency. The book begins with foundational AI concepts tailored for healthcare professionals, establishing a solid base in machine learning, neural networks, and data science. It then guides readers through practical applications across the care continuum-exploring how predictive analytics can forecast disease risks, how AI powers telemedicine and remote monitoring systems, and how it enhances clinical decision-making through smarter, data-driven EHR systems. Each chapter builds with real-world examples, case studies, and implementation frameworks, offering clarity on emerging tools like computer vision for diagnostics, personalized treatment algorithms, and intelligent automation in hospital workflows. Whether you're a healthcare professional, researcher, or policymaker, this book provides the insights you need to stay ahead in a tech-driven world. Don't get left behind-embrace the tools shaping the future of medicine and lead the change with confidence. Table of Contents1. Introducing AI in Healthcare2. AI Fundamentals for Healthcare3. Predictive Analysis in Healthcare4. Artificial Intelligence in Telemedicine Remote Patient Monitoring5. AI in Clinical Decision Support and Electronic Health Record6. Imaging and Diagnosis Using AI7. Challenges and Limitations of AI in Healthcare8. Future of AI in Healthcare Index
Information Security and Cryptology
The two-volume set LNCS 15543 and 15544 constitutes revised selected papers of the 20th International Conference on Information Security and Cryptology, Inscrypt 2024, held in Kunming, China, during December 14-16, 2024. The 47 full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers were organized in the following topical sections: Part I: Big data and cloud security; Foundations of Cryptography; Implementation of Cryptosystems; Key Exchange; AI and Security; Security Analysis; Privacy-enhancing technologies; Watermarking. Part II: Public Key Cryptosystems; Security Protocols Analysis; Symmetric Cryptanalysis; Quantum and Post Quantum Cryptography.
Artificial Intelligence and Applications
This book constitutes the proceedings of the 26th International Conference on Artificial Intelligence and Applications, ICAI 2024, held as part of the 2024 World Congress in Computer Science, Computer Engineering and Applied Computing, in Las Vegas, USA, during July 22 to July 25, 2024. The 38 full papers included in this book were carefully reviewed and selected from 376 submissions. They have been organized in topical sections as follows: Deep convolutional neural networks, ANNs, and applications; machine learning and novel applications; large language models and applications; data science, recognition and authentication methods and applications; artificial intelligence and applications; XXIV Technical Session on Applications of Advanced AI Techniques to information management for solving company-related problems.
Terraform for Developers, Second Edition
This is the second edition of the Terraform for Developers book, presenting a thoroughly practical approach to using IaC for robust deployment and maintenance. This latest release is the most updated edition on Terraform, with the latest capabilities, patterns, and hands-on applications. Each chapter breaks down complex ideas into easy-to-follow steps, showing how to deal with the real challenges that come up in modern cloud deployments.You'll start by learning the basics, like providers, variables, and states. It also highlights some really cool modules, showing how to create, reuse, and share them across projects. Later on, it covers secrets management, showing how to store and handle sensitive data safely. It also covers advanced networking and multi-cloud usage, hurdles in bridging subnets, load balancers, and container orchestration frameworks. It also covers troubleshooting across the syntax, logic, and runtime issues that might occur. And it shows how to incorporate testing, from unit checks on modules to integration scenarios for multi-service environments.The final chapters cover advanced topics such as customizing workflows with CI/CD pipelines and using test environments. This book won't turn you into a Terraform master overnight, but it will show you all the practical features, patterns, and tricks to improve your infrastructure management.Key LearningsDiscover how Terraform streamlines resource provisioning.Write maintainable modules with confidence.Integrate advanced network constructs, subnets, and routing logic across multi-cloud topologies.Employ ephemeral credentials with Vault dynamic secrets.Automate robust tests, from unit checks to full environment validations.Practical debugging steps for syntax, semantic, and runtime errors.Adopt CI/CD pipelines to unify code reviews and automated deployments.Combine container orchestration solutions with Terraform's consistent state tracking to scale clusters.Structure microservices, security, and multi-environment usage.Track resource utilization, concurrency, and code maintainability across your stack.Table of ContentIntroduction to Terraform and IaCGetting Started with TerraformEssentials of Terraform Configuration LanguageTerraform Modules and Reusable InfrastructureTerraform State ManagementProvisioners and Provisioning ResourcesWorking with SecretsAdministering Networks with TerraformAdvanced Topics in TerraformAdministering Terraform As Expert
API Management with Bruno
​​​​​​​If you're an API practitioner, this book will show you how to use Bruno to its maximum capacity for managing your API lifecycle. Bruno is a new alternative to Postman and Insomnia; this practical book will teach you how to use it for API design, development, testing, deployment, and monitoring. The book is less concerned with helping you become an API Management expert than it is with showing you how to make the most of Bruno's features so that you can efficiently complete tasks in the real world.The chapters cover topics such as creating a safe and scalable development environment, using the Bruno command line interface (CLI), and creating API blueprints with Bru Lang that are easy to understand and maintain. You'll learn how to embed business logic, manage data transformations, and implement robust error handling to build dynamic endpoints that respond to real-time events. In an effort to protect sensitive information, practical implementations of OAuth 2.0 authorization, JWT authentication, and effective secret management are implemented. Your API's reliability and scalability under different conditions can be further assured with automated testing and live debugging sessions.You can automate mundane tasks and expand your API's functionality with the help of the advanced integrations covered in this book. These integrations allow you to connect to popular platforms like AWS, Jira, GitHub, and Jenkins. Additionally, you will become an expert at configuring and executing webhooks and event-driven actions, which are crucial for keeping your API in sync with external systems.Key LearningsUse Bruno CLI via npm for simplified installation and guarantees an up-to-date API management toolkit.Create clear API blueprints for designing and building robust endpoints.Integrate JWT authentication for secure API access while supporting scalable, stateless user management practices.Integrate OAuth 2.0 for fine-grained authorization, and to control access to sensitive API resources.Implement secrets management via environment variables to protect credentials and maintains secure configuration.Implement automated test suites to validate API functionality across all endpoints.Carry out real-time debugging and logging of API interactions during live operations.Write custom automation scripts to streamline testing, deployment, and data management across API workflows.Integrate with third-party services like Jira, GitHub, Jenkins, and AWS.Work around webhooks and event-driven actions to respond real-time events.Table of ContentGetting Started with BrunoStructuring API ProjectDesigning API ProjectBuilding API with Bru LangTesting API FunctionalitiesImplementing SecurityDebugging and Optimizing APIsAutomating API TasksAdvanced Integration and Services
Securing the AWS Cloud
Make your next Amazon Web Services deployment secure and private Dive into the world of cloud security with Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure by Brandon Carroll, a comprehensive guide crafted for those eager to fortify their Amazon Web Services (AWS) deployments. Whether you are starting from scratch or looking to enhance an existing setup, this book serves as your essential roadmap to understanding and implementing robust security measures in the AWS environment. The author, a seasoned infrastructure security expert, begins with the basics of cybersecurity and gradually introduces more complex AWS-specific security practices. His structured approach helps you use your existing knowledge to effectively secure your AWS cloud. The book navigates through a series of real-world challenges and provides actionable solutions, equipping you with the skills needed to tackle security issues head-on. You'll: Learn foundational security practices to safeguard your AWS environment right from the start. Master advanced techniques for identity management, threat detection, and data security within AWS. Develop resilience and recovery strategies to maintain robust security and ensure business continuity. Securing the AWS Cloud is the ideal resource for IT professionals, system administrators, and anyone aspiring to specialize in cloud security. It's tailor-made to enhance your ability to deploy secure, reliable, and private AWS solutions consistently. If you're ready to take your AWS security skills to the next level, don't wait. Buy your copy today and start building a safer cloud environment!
Risks and Security of Internet and Systems
This book constitutes the revised selected papers of the 19th International Conference on Risks and Security of Internet and Systems, CRiSIS 2024, held in Aix-en-Provence, France, during November 26-28, 2024. The 32 full papers and 2 short papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Security Network Protocols; AI-Driven Threat Detection; Information Security Management; Applied Cryptography & Privacy; Threats Detection & Protection; Risk Identification & Management; Blockchain & Distributed Ledger Security; AI for Security Assessment.
Hands-On Artificial Intelligence for IoT - Second Edition
Master AI and IoT integration, from fundamentals to advanced techniques, and revolutionize your approach to building intelligent, data-driven solutions across industriesKey Features: - Leverage the power of Python libraries such as TensorFlow and Keras to work with real-time IoT data- Enhance your IoT solutions with advanced AI techniques, including deep learning, optimization, and generative adversarial networks- Gain practical insights through industry-specific IoT case studies in manufacturing, smart cities, and automation- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Transform IoT devices into intelligent systems with this comprehensive guide by Amita Kapoor, Chief AI Officer at Tipz AI. Drawing on 25 years of expertise in developing intelligent systems across industries, she demonstrates how to harness the combined power of artificial intelligence and IoT technology. A pioneer in making AI and neuroscience education accessible worldwide, Amita guides you through creating smart, efficient systems that leverage the latest advances in both fields. This new edition is updated with various optimization techniques in IoT used for enhancing efficiency and performance. It introduces you to cloud platforms such as Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) for analyzing data generated using IoT devices. You'll learn about machine learning algorithms, deep learning techniques, and practical applications in real-world IoT scenarios and advance to creating AI models that work with diverse data types, including time series, images, and audio. You'll also harness the power of widely used Python libraries, TensorFlow and Keras, to build a variety of smart AI models. By the end of the book, you'll emerge as a master of AI-driven IoT, armed with invaluable experience in optimizing IoT devices, boosting their performance, and integrating AI algorithms to make intelligent decisions.What You Will Learn: - Integrate AI and IoT for enhanced device intelligence- Understand how to build scalable and efficient IoT systems- Master both supervised and unsupervised machine learning techniques for processing IoT data- Explore the full potential of deep learning in IoT applications- Discover AI-driven strategies to optimize IoT system efficiency- Implement real-world IoT projects that leverage AI capabilities- Improve device performance and decision-making using AI algorithmsWho this book is for: This book is for IoT developers, engineers, and tech enthusiasts, particularly those with a background in Python, looking to integrate artificial intelligence and machine learning into IoT systems. Python developers eager to apply their knowledge in new, innovative ways will find it useful. It's also an invaluable guide for anyone with a foundational understanding of IoT concepts ready to take their skills to the next level and shape the future of intelligent devices.Table of Contents- Principles and Foundations of IoT and AI- Data Access and Distributed Processing for IoT- Machine Learning for IoT- Deep Learning for IoT- Optimization Techniques in IoT- Reinforcement Learning for IoT- Generative Adversarial Networks for IoT- Distributed AI for IoT- AI Cloud Platforms for IoT- Deep Learning for Time Series Data from IoT- AI for Video and Image Data from IoT- AI for Text, Audio and Speech Data from IoT- AI for Personal and Home IoT- AI for Industrial IoT- AI for Smart Cities IoT
Adversary Emulation with Mitre Att&ck
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of experience in the cybersecurity field. You'll learn to assess resilience against coordinated and stealthy threat actors capable of harming an organization. Author Drinor Selmanaj demonstrates adversary emulation for offensive operators and defenders using practical examples and exercises that actively model adversary behavior. Each emulation plan includes different hands-on scenarios, such as smash-and-grab or slow-and-deliberate. This book uses the MITRE ATT&CK knowledge base as a foundation to describe and categorize TTPs based on real-world observations and provides a common language that's standardized and accessible to everyone. You'll learn how to: Map cyber threat intelligence to ATT&CK Define adversary emulation goals and objectives Research adversary emulation TTPs using the ATT&CK knowledge base Plan and conduct adversary emulation and communicate your findings Automate adversary emulation to support repeatable testing Execute FIN6, APT3, and APT29 emulation plans
Understanding the Artificial Intelligence Revolution
Suitable for the general reader, Understanding the Artificial Intelligence Revolution: Between Catastrophe and Utopia is the ideal book for anyone seeking a clear and informed introduction to AI.
Cybersecurity in Knowledge Management
The book explores the intersection of knowledge management and cybersecurity, offering an examination of strategies, technologies and frameworks necessary to safeguard organizational knowledge systems. By incorporating perspectives from AI, machine learning, and human factors, it provides a holistic approach to securing knowledge.
Understanding the Artificial Intelligence Revolution
Suitable for the general reader, Understanding the Artificial Intelligence Revolution: Between Catastrophe and Utopia is the ideal book for anyone seeking a clear and informed introduction to AI.
Practical Network Security with OpenSSL
Gain practical OpenSSL skills for real-world cybersecurity challenges Book DescriptionOpenSSL is the backbone of secure communication on the internet, trusted by developers, enterprises, and governments alike. Practical Network Security with OpenSSL equips you with the knowledge, real-world context, and hands-on skills to master OpenSSL-from its command-line tools to its C library APIs-for implementing robust, enterprise-grade cryptographic solutions. You'll begin with a solid foundation in cryptographic principles and the role of OpenSSL in modern security systems. The book then guides you through practical usage, covering symmetric and asymmetric encryption, Public Key Infrastructure (PKI), and secure communications. Real-world examples and C code snippets help you confidently apply OpenSSL in standalone applications, enterprise-grade solutions, and hardware-based security environments such as HSMs and TPMs. By the end of this book, you'll have the expertise to confidently use OpenSSL for designing, implementing, and managing cryptographic solutions across various domains. Whether you're securing financial transactions, IoT networks, or enterprise authentication systems, you'll be equipped with the tools and knowledge to build secure, future-ready applications. Don't get left behind-secure your systems like the pros do with OpenSSL mastery. Table of Contents1. Cryptography Basics and Network Security2. Getting started with OpenSSL3. OpenSSL Command Line Interface4. OpenSSL C library APIs5. Public Key Infrastructure with OpenSSL6. Symmetric Key Cryptography with OpenSSL7. OpenSSL Engine for Security Hardware8. OpenSSL in IoT Security9. Best Practices, Tips, and Tricks Index