Cyber Security for Next-Generation Computing Technologies
Human-Computer Interaction
This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.
AI for Everyday It
Automate and accelerate everyday IT tasks using generative AI! Read this book, and you may never write another "after incident" report from scratch again! AI for Everyday IT reveals how you can automate dozens of your daily IT tasks with generative AI--including writing email and reports, setting up a chatbot to field helpdesk requests, evaluating disaster recovery plans, and more. In AI for Everyday IT you'll learn how to: - Write effective prompts for common IT tasks - Optimize report generation, document handling, and workplace communication - Resolve IT conflicts and crises - Acquire new skills and upgrade your resume - AI for security engineering and systems administration How many times have you lost an entire day sifting through logs to find a latency issue? AI can do it in seconds! Do you need to update your documentation? Mere moments for AI. Are you writing scripts, upgrading security, and evaluating network designs? AI can handle it--if you know how to use it. In this hands-on guide, automation experts Brandon Abshire and Chrissy LeMaire show you how AI tools like ChatGPT have made their lives a million times easier, and how it can do the same for you. Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications. About the book AI for Everyday IT is full of tested, actionable advice for enhancing and accelerating IT tasks using generative AI tools like ChatGPT and Copilot. It lays out dozens of common IT tasks that AI can help with, and provides the prompts and problem formulation methods that will deliver the best results. You'll learn how AI can assist with root cause analysis, disaster recovery planning, effective sysadmin scripting, and even writing professional emails when you're too furious to be nice! By the time you're finished, you'll know exactly how to save massive amounts of time and keep yourself competitive in the IT workplace. About the reader For IT support workers, sysadmins, database administrators, technical managers, and security pros who want to make their lives easier with generative AI. No previous AI experience required. About the author Chrissy LeMaire is a dual Microsoft MVP and GitHub Star, the creator of dbatools, and author of the Manning book Learn dbatools in a Month of Lunches. Brandon Abshire is the technical manager of the Epic Systems and Database Administration teams at Cedars-Sinai in Los Angeles, California.
Cyber Risk Management in Practice
Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity. Whether you're expanding your knowledge or looking to sharpen your existing skills, this book demystifies the complexities of cyber risk management, offering clear, actionable strategies to enhance your organization's security posture. With a focus on real-world solutions, this guide balances practical application with foundational knowledge.Key Features: Foundational Insights: Explore fundamental concepts, frameworks, and required skills that form the backbone of a strong and pragmatic cyber risk management program tailored to your organization's unique needs. It covers everything from basic principles and threat modeling to developing a security-first culture that drives change within your organization. You'll also learn how to align cybersecurity practices with business objectives to ensure a solid approach to risk management. Practical Application: Follow a hands-on step-by-step implementation guide through the complete cyber risk management cycle, from business context analysis to developing and implementing effective treatment strategies. This book includes templates, checklists, and practical advice to execute your cyber risk management implementation, making complex processes manageable and straightforward. Real-world scenarios illustrate common pitfalls and effective solutions. Advanced Strategies: Go beyond the basics to achieve cyber resilience. Explore topics like third-party risk management, integrating cybersecurity with business continuity, and managing the risks of emerging technologies like AI and quantum computing. Learn how to build a proactive defense strategy that evolves with emerging threats and keeps your organization secure. "Cyber Risk Management in Practice: A Guide to Real-World Solutions by Carlos Morales serves as a beacon for professionals involved not only in IT or cybersecurity but across executive and operational roles within organizations. This book is an invaluable resource that I highly recommend for its practical insights and clear guidance" - Jos矇 Antonio Fern獺ndez Carbajal. Executive Chairman and CEO of FEMSA
Information Security Governance Using Artificial Intelligence of Things in Smart Environments
The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments. It delves into how AI enhances the governance of information security by automating processes, detecting threats, and ensuring the protection of data in interconnected IoT systems. It covers theoretical foundations, practical frameworks, and case studies, offering insights into securing smart cities, homes, industries, and healthcare systems. It emphasizes governance models that leverage AI to manage security policies and risk in dynamic, data-driven ecosystems. The book focuses on the study and application of AI of Things in the field of information security governance. Intelligent environments, characterized by increasing connectivity of devices and systems, present unique challenges for information security. The use of AI of Things offers opportunities to enhance security in these complex environments.
Human-Computer Interaction
This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.
Cyber Risk Management in Practice
Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity. Whether you're expanding your knowledge or looking to sharpen your existing skills, this book demystifies the complexities of cyber risk management, offering clear, actionable strategies to enhance your organization's security posture. With a focus on real-world solutions, this guide balances practical application with foundational knowledge.Key Features: Foundational Insights: Explore fundamental concepts, frameworks, and required skills that form the backbone of a strong and pragmatic cyber risk management program tailored to your organization's unique needs. It covers everything from basic principles and threat modeling to developing a security-first culture that drives change within your organization. You'll also learn how to align cybersecurity practices with business objectives to ensure a solid approach to risk management. Practical Application: Follow a hands-on step-by-step implementation guide through the complete cyber risk management cycle, from business context analysis to developing and implementing effective treatment strategies. This book includes templates, checklists, and practical advice to execute your cyber risk management implementation, making complex processes manageable and straightforward. Real-world scenarios illustrate common pitfalls and effective solutions. Advanced Strategies: Go beyond the basics to achieve cyber resilience. Explore topics like third-party risk management, integrating cybersecurity with business continuity, and managing the risks of emerging technologies like AI and quantum computing. Learn how to build a proactive defense strategy that evolves with emerging threats and keeps your organization secure. "Cyber Risk Management in Practice: A Guide to Real-World Solutions by Carlos Morales serves as a beacon for professionals involved not only in IT or cybersecurity but across executive and operational roles within organizations. This book is an invaluable resource that I highly recommend for its practical insights and clear guidance" - Jos矇 Antonio Fern獺ndez Carbajal. Executive Chairman and CEO of FEMSA
Human-Computer Interaction
This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.
Human-Computer Interaction
This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.
Mastering Deepfake Technology
This book offers a comprehensive exploration of the profound challenges and opportunities presented by deepfake technology across industries, society, and governance. It delves into the multifaceted impacts of synthetic media, examining its potential to reshape corporate trust, economic stability, and public discourse while emphasizing strategies to build resilience and ethical frameworks.Key themes include the role of intellectual capital in safeguarding corporate reputation, the risks of deepfake fraud in financial markets, and the implications for insurance, banking, and fintech sectors. Through cross-disciplinary analyses, the book unravels the disruptive influence of deepfakes on political affairs, economic policies, and corporate transparency.Highlighting real-world case studies, it addresses workplace resilience, data-driven decision-making, and the intersection of deepfake technology with marketing innovation and job satisfaction. From social media marketing to public trust and privacy concerns, the book offers actionable insights for navigating the ethical dilemmas posed by synthetic media.With a focus on collaboration across disciplines, the book equips readers with strategies for mitigating risks, promoting media literacy, and leveraging AI responsibly. Mastering Deepfake Technology is an essential guide for academics, professionals, and policymakers seeking to understand and address the complexities of this emerging frontier.
Innovations for Community Services
This book constitutes the refereed proceedings of the 25th International Conference on Innovations for Community Services, I4CS 2025, held in Munich, Germany, during June 11-13, 2025.The 21 full papers presented in this book together with 3 short papers were carefully reviewed and selected from 55 submissions.They are organized in topical sections as follows: recognition and verification; computational intelligence; data processing; quantum computing; public sector; serious games; information security; and community challenges.
Cyber Security Kill Chain - Tactics and Strategies
Understand the cyber kill chain framework and discover essential tactics and strategies to effectively prevent cyberattacksKey Features: - Explore each stage of the cyberattack process using the cyber kill chain and track threat actor movements- Learn key components of threat intelligence and how they enhance the cyber kill chain- Apply practical examples and case studies for effective, real-time responses to cyber threats- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Gain a strategic edge in cybersecurity by mastering the systematic approach to identifying and responding to cyber threats through a detailed exploration of the cyber kill chain framework. This guide walks you through each stage of the attack, from reconnaissance and weaponization to exploitation, command and control (C2), and actions on objectives. Written by cybersecurity leaders Gourav Nagar, Director of Information Security at BILL Holdings, with prior experience at Uber and Apple, and Shreyas Kumar, Professor of Practice at Texas A&M, and former expert at Adobe and Oracle, this book helps enhance your cybersecurity posture. You'll gain insight into the role of threat intelligence in boosting the cyber kill chain, explore the practical applications of the framework in real-world scenarios, and see how AI and machine learning are revolutionizing threat detection. You'll also learn future-proofing strategies and get ready to counter sophisticated threats like supply chain attacks and living-off-the-land attacks, and the implications of quantum computing on cybersecurity.By the end of this book, you'll have gained the strategic understanding and skills needed to protect your organization's digital infrastructure in the ever-evolving landscape of cybersecurity.What You Will Learn: - Discover methods, tools, and best practices to counteract attackers at every stage- Leverage the latest defensive measures to thwart command-and-control activities- Understand weaponization and delivery techniques to improve threat recognition- Implement strategies to prevent unauthorized installations and strengthen security- Enhance threat prediction, detection, and automated response with AI and ML- Convert threat intelligence into actionable strategies for enhancing cybersecurity defensesWho this book is for: This book is for cybersecurity professionals, IT administrators, network engineers, students, and business leaders who want to understand modern cyber threats and defense strategies. It's also a valuable resource for decision-makers seeking insight into cybersecurity investments and strategic planning. With clear explanation of cybersecurity concepts suited to all levels of expertise, this book equips you to apply the cyber kill chain framework in real-world scenarios, covering key topics such as threat actors, social engineering, and infrastructure security.Table of Contents- Understanding the Cyber Security Kill Chain- Reconnaissance - The Initial Breach Plan- Weaponization- Delivery- Exploitation- Installation- Command and Control- Actions on Objectives- Cyber Security Kill Chain and Emerging Technologies- Legal and Ethical Aspects of Cyber Security Kill Chain- The Future- A Proactive Approach
Redefining Information Security
Redefining Information Security shows security and technology leaders how to build a security-driven culture that not only safeguards but actively propels businesses forward, enabling innovation and growth in the face of an evolving digital business and threat landscape. This book pioneers a transformative approach that shields organizations from risks but also actively leverages them to drive competitive advantages. Redefining Information Security addresses the technical aspects of cybersecurity in addition to the organizational culture, leadership, communication, education and human factors that make up the integral components of a successful security strategy. It offers a strong emphasis on practical implementation, providing actionable guidance and tools to apply proactive security strategies. Redefining Information Security offers insights on integrating security into technology roadmaps and leveraging it as a growth catalyst. It introduces innovative risk management strategies, allowing organizations to navigate uncertainties while maintaining a robust security posture. This guide presents a wealth of real-word examples that provide insights into how organizations at the forefront of security innovation integrate and embed security within their strategic vision and explores how security can evolve to meet the challenges of tomorrow's digital landscape.
Where Matters
Imagine a hospital where equipment never goes missing, patients never wait unnecessarily, and staff focus on care instead of logistics. In Where Matters: Healthcare's Playbook for Location-Based Services 2.0 and AI, this vision becomes reality through care traffic control (CTC), a revolutionary framework that brings the precision and reliability of aviation traffic control to healthcare operations.Drawing from decades of experience in both aviation and healthcare, the authors reveal how location-based services and digital twin technologies can transform healthcare operations from reactive to predictive, from fragmented to orchestrated, from inefficient to optimized. This isn't just another technology book - it's a blueprint for operational revolution.Through the compelling journey of Edenvale General Hospital, readers witness the dramatic transformation that occurs when real-time location intelligence meets operational excellence. From reduced costs and improved patient satisfaction to enhanced staff productivity and safety, the results are nothing short of extraordinary.Learn how to: Create a hospital command center that rivals the sophistication of air traffic control Deploy automation that enhances rather than replaces human capabilities Transform chaotic workflows into synchronized symphonies of efficiency Build a digital twin that makes the invisible visible and the impossible achievable Generate immediate returns while building toward long-term transformation Whether you're a healthcare executive seeking operational excellence, a technology leader navigating digital transformation, or an improvement professional driving change, Where Matters: Healthcare's Playbook for Location-Based Services 2.0 and AI provides the roadmap, tools, and insights you need. Each chapter includes specific guidance for improvers, leaders, and vendors, ensuring practical application across all stakeholder groups.This isn't just about tracking assets or monitoring workflows - it's about fundamentally reimagining how healthcare operations can work. Through real-world examples, practical frameworks, and proven methodologies, Where Matters: Healthcare's Playbook for Location-Based Services 2.0 and AI shows you how to turn this vision into reality. Join the operational revolution that's transforming healthcare - because in the future of healthcare operations, where matters.
Where Matters
Imagine a hospital where equipment never goes missing, patients never wait unnecessarily, and staff focus on care instead of logistics. In Where Matters: Healthcare's Playbook for Location-Based Services 2.0 and AI, this vision becomes reality through care traffic control (CTC), a revolutionary framework that brings the precision and reliability of aviation traffic control to healthcare operations.Drawing from decades of experience in both aviation and healthcare, the authors reveal how location-based services and digital twin technologies can transform healthcare operations from reactive to predictive, from fragmented to orchestrated, from inefficient to optimized. This isn't just another technology book - it's a blueprint for operational revolution.Through the compelling journey of Edenvale General Hospital, readers witness the dramatic transformation that occurs when real-time location intelligence meets operational excellence. From reduced costs and improved patient satisfaction to enhanced staff productivity and safety, the results are nothing short of extraordinary.Learn how to: Create a hospital command center that rivals the sophistication of air traffic control Deploy automation that enhances rather than replaces human capabilities Transform chaotic workflows into synchronized symphonies of efficiency Build a digital twin that makes the invisible visible and the impossible achievable Generate immediate returns while building toward long-term transformation Whether you're a healthcare executive seeking operational excellence, a technology leader navigating digital transformation, or an improvement professional driving change, Where Matters: Healthcare's Playbook for Location-Based Services 2.0 and AI provides the roadmap, tools, and insights you need. Each chapter includes specific guidance for improvers, leaders, and vendors, ensuring practical application across all stakeholder groups.This isn't just about tracking assets or monitoring workflows - it's about fundamentally reimagining how healthcare operations can work. Through real-world examples, practical frameworks, and proven methodologies, Where Matters: Healthcare's Playbook for Location-Based Services 2.0 and AI shows you how to turn this vision into reality. Join the operational revolution that's transforming healthcare - because in the future of healthcare operations, where matters.
Information Security and Privacy Quick Reference
A fast, accurate, and up-to-date desk reference for information security and privacy practitioners everywhere Information security and privacy roles demand up-to-date knowledge coming from a seemingly countless number of sources, including several certifications--like the CISM, CIPP, and CISSP--legislation and regulations issued by state and national governments, guidance from local and industry organizations, and even international bodies, like the European Union. The Information Security and Privacy Quick Reference: The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer is an updated, convenient, and accurate desk reference for information privacy practitioners who need fast and easy access to the latest guidance, laws, and standards that apply in their field. This book is the most effective resource for information security professionals who need immediate and correct solutions to common and rarely encountered problems. An expert team of writers--Joe Shelley, James Michael Stewart, and the bestselling technical author, Mike Chapple--draw on decades of combined technology and education experience to deliver organized and accessible coverage of: Security and Privacy Foundations Governance, Risk Management, and Compliance Security Architecture and Design Identity and Access Management Data Protection and Privacy Engineering Security and Privacy Incident Management Network Security and Privacy Protections Security Assessment and Testing Endpoint and Device Security Application Security Cryptography Essentials Physical and Environmental Security Legal and Ethical Considerations Threat Intelligence and Cyber Defense Business Continuity and Disaster Recovery Information Security and Privacy Quick Reference is a must-have resource for CISOs, CSOs, Chief Privacy Officers, and other information security and privacy professionals seeking a reliable, accurate, and fast way to answer the questions they encounter at work every single day.
Digital Forensics and Cyber Crime
The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9-10, 2024. The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics. Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.
Code-Based Cryptography
This book constitutes the refereed proceedings of the 12th International Conference on Code-Based Cryptography, CBCrypto 2024, held in Zurich, Switzerland, during May 25-26, 2024. The 5 full papers presented in this book were carefully reviewed and selected from 41 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.
Digital Forensics and Cyber Crime
The two-volume set, LNICST 613 and 614, constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2024, held in Dubrovnik, Croatia, during October 9-10, 2024. The 40 full papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Part I- Artificial Intelligence & Security; Multimedia Forensics; Intrusion Detection; Intrusion and Fraud Detection; Large Language Models, Advances in Security and Forensics; Advances in Security and Forensics. Part II- Security Analytics, Threat Intelligence, Multimedia Forensics; Generative AI, Emerging Threats.
Leveraging Artificial Intelligence and Machine Learning
Optimized Deep Learning for Network Intrusion Detection
Acting, Planning, and Learning
AI's next big challenge is to master the cognitive abilities needed by intelligent agents that perform actions. Such agents may be physical devices such as robots, or they may act in simulated or virtual environments through graphic animation or electronic web transactions. This book is about integrating and automating these essential cognitive abilities: planning what actions to undertake and under what conditions, acting (choosing what steps to execute, deciding how and when to execute them, monitoring their execution, and reacting to events), and learning about ways to act and plan. This comprehensive, coherent synthesis covers a range of state-of-the-art approaches and models -deterministic, probabilistic (including MDP and reinforcement learning), hierarchical, nondeterministic, temporal, spatial, and LLMs -and applications in robotics. The insights it provides into important techniques and research challenges will make it invaluable to researchers and practitioners in AI, robotics, cognitive science, and autonomous and interactive systems.
Attack Surface Management
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Cybersecurity engineers, system administrators, and network administrators will explore key components, from networks and cloud systems to human factors. Authors Ron Eddings and MJ Kaufmann offer actionable solutions for newcomers and experts alike, using machine learning and AI techniques. ASM helps you routinely assess digital assets to gain complete insight into vulnerabilities, and potential threats. The process covers all security aspects, from daily operations and threat hunting to vulnerability management and governance. You'll learn: Fundamental ASM concepts, including their role in cybersecurity> How to assess and map your organization's attack surface, including digital assets and vulnerabilities Strategies for identifying, classifying, and prioritizing critical assets Attack surfaces types, including each one's unique security challenges How to align technical vulnerabilities with business risks Principles of continuous monitoring and management to maintain a robust security posture Techniques for automating asset discovery, tracking, and categorization Remediation strategies for addressing vulnerabilities, including patching, monitoring, isolation, and containment How to integrate ASM with incident response and continuously improve cybersecurity strategies ASM is more than a strategy--it's a defense mechanism against growing cyber threats. This guide will help you fortify your digital defense.
Information Management and Big Data
This book constitutes the proceedings of the 11th Annual International Conference on Information Management and Big Data, SIMBig 2024, held in Ilo, Peru, during November 20-22, 2024. The 27 full papers and 1 short paper included in this book were carefully reviewed and selected from 102 submissions. They were organized in topical sections as follows: machine learning and deep learning; natural language processing; mining of social networks and online platforms; and signal and image processing.
Soft Computing and Its Engineering Applications
The two-volume proceedings set CCIS 2430-2431 constitutes the revised selected papers of the 6th International Conference on Soft Computing and its Engineering Applications, icSoftComp 2024, held in Bangkok, Thailand, during December 10-12, 2024. The 58 full papers and 3 short papers included in this book were carefully reviewed and selected from 501 submissions. They were organized in topical sections as follows: Part I: Theory and Methods.Part II: Theory and Methods; Systems and Applications; Hybrid Techniques; Soft Computing for Smart World.