Computational Science and Its Applications - Iccsa 2025 Workshops
The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
Next Generation Data Science and Blockchain Technology for Industry 5.0
A groundbreaking view of the industrial models of the future Industry 5.0 is an increasingly widespread term for the coming business paradigm, which will combine humans, robotics, and smart technology to create the industrial processes of the future. Technological innovations like smart factories, networked processes, data science, Blockchain, and more will be combined to revolutionize industry and drive innovation at an unprecedented pace. Innovation-minded knowledge workers will be increasingly forced to grapple with challenging questions in order to meet the demands, and exploit the opportunities, of this groundbreaking paradigm. Next Generation Data Science and Blockchain Technology for Industry 5.0 offers an overview of these most important questions, their early answers, and the most promising paths forward. Incorporating practical case studies grounded in real-world data, the book emphasizes a hands-on approach combining numerous analytical tools. With a broad view of the historical role of industrial revolutions and a cutting-edge grasp of the key technologies, this book is an indispensable window into the future of business. Next Generation Data Science and Blockchain Technology for Industry 5.0 readers will also find: Incorporation of tools including statistical analysis, machine learning, graph analysis, and more Detailed treatment of cutting-edge technologies like additive manufacture (3D printing), edge computing, and many others Self-assessment tools to facilitate understanding Next Generation Data Science and Blockchain Technology for Industry 5.0 is ideal for academics, researchers, and advanced students in Computer Science and Computer Technology, as well as professionals and researchers working in Data Science or any other area of industrial technology.
Information Security and Privacy
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14-16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed andselected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.
Agentic AI and the Future of Work
'As AI continues to evolve, one of the most talked-about and impactful advancements across industries is Agentic AI. But what exactly is Agentic AI, and why does it matter so much to businesses and individuals right now?' Agentic AI goes beyond simply automating tasks. It can plan, make decisions, take action, and adapt to new information. AI agents are capable of collaborating with other agents, systems, and people - reshaping how work gets done and how value is created. The rise of these digital workers will have a profound effect on industries, roles, and organizations of all sizes. This book provides real-world examples and case studies to show how Agentic AI is already being used to increase efficiency, enhance decision-making, and scale operations. These examples help demystify the technology and offer practical inspiration for how it can be applied in your own business.You don't need a background in AI to benefit from this book. It's written for managers, executives, consultants, and anyone interested in understanding how Agentic AI will impact the future of work, business strategy, and competitive advantage. As organizations race to adopt this new form of intelligent automation, those who understand and lead the change will be the ones who thrive. This book helps you do just that.
Learning API Styles
An application programming interface (API) enables data exchange in systems such as web applications, microservices, and IoT devices. In this hands-on book, authors Lukasz Dynowski and Marcin Dulak show software developers and architects how to design and implement REST, GraphQL, gRPC, webhooks, WebSocket, messaging APIs, and more. This book looks at the most popular API styles from a network, application, and architecture perspective. You'll learn how to determine the appropriate type of API for your application use case and how to tackle design decisions along the way. You'll also learn the trade-offs between various APIs and acquire practical knowledge of how to implement them. Explore the origins and evolution of API styles Learn network protocols that various APIs use Understand the trade-offs of each API style Select an appropriate API style Learn how to implement, secure, and document the APIs
Information Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Information Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Public Key Infrastructure
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cyber Security Education
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cyber Security Education
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Public Key Infrastructure
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Advancements In Smart Card And Biometric Technology
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Information Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cyber Forensics and Digital Security
In today's hyperconnected world, where digital transformation accelerates at an unprecedented pace, the dark underbelly of cybercrime evolves just as rapidly. This comprehensive guide addresses the critical intersection of artificial intelligence, digital forensics, and cybersecurity, offering professionals a vital roadmap through the complex landscape of modern cyber threats.As organizations worldwide face increasingly sophisticated attacks - from AI-powered malware to blockchain-enabled fraud schemes - the traditional approaches to digital security are proving inadequate. This book rises to meet this challenge, presenting a forward-thinking framework that combines cutting-edge forensic techniques with advanced risk management strategies. It serves as both an educational resource and practical manual for cybersecurity specialists, forensic investigators, law enforcement personnel, and IT risk managers who must stay ahead of adversaries in this high-stakes digital arms race.The content systematically explores the full spectrum of contemporary cyber threats while providing actionable solutions rooted in real-world experience. Beginning with foundational concepts, the book progresses to advanced topics including machine learning applications in threat detection, blockchain forensic analysis, and the emerging field of predictive cybersecurity. Readers will gain expertise in critical areas such as incident response protocols, digital evidence preservation, cloud security forensics, and the legal considerations surrounding cyber investigations.What sets this work apart is its emphasis on the transformative role of artificial intelligence in both perpetrating and preventing cybercrime. Detailed case studies demonstrate how AI algorithms can analyze patterns in massive datasets to predict attacks, while also examining how cybercriminals weaponize these same technologies. The book provides hands-on guidance for implementing AI-driven security systems, with particular focus on anomaly detection, behavioral analytics, and automated threat response.For forensic professionals, specialized chapters cover the complete investigative process from crime scene documentation to courtroom testimony. Topics include memory forensics, network traffic analysis, mobile device examination, and countering anti-forensic techniques. The risk management sections offer proven methodologies for vulnerability assessment, security architecture design, and developing organizational cyber resilience.Recognizing that effective cybersecurity requires more than technical skills, the book also addresses human factors including social engineering defense, security awareness training, and building a culture of cyber vigilance. It concludes with forward-looking perspectives on quantum computing threats, IoT security challenges, and preparing for the next generation of digital risks.
The Collaborative Coder
The digital revolution has redefined the boundaries of software development, transforming it into a borderless, asynchronous, and globally connected discipline. The Collaborative Coder is the definitive guide for developers, engineering leaders, and remote teams navigating this new landscape where success depends not just on technical skill, but on the ability to collaborate effectively across screens, time zones, and cultures.This book bridges the gap between traditional coding expertise and the nuanced demands of distributed teamwork. It goes beyond tools and workflows to address the human dynamics of remote-first development how to build trust without face-to-face interaction, maintain alignment without micromanagement, and foster innovation without spontaneous office encounters. Through real-world insights and actionable strategies, it equips readers to turn the challenges of remote work into a competitive edge.From asynchronous communication frameworks to conflict resolution in virtual environments, from maintaining code quality in distributed repos to leading inclusive standups across continents, The Collaborative Coder provides the missing playbook for thriving in this new era. It's essential reading for anyone who writes, leads, or collaborates on code in a world where the office is optional, but connection is not.The future of software isn't just about what we build it's about how we build it together.
Practical Cloud Security Handbook
As organizations rapidly migrate to cloud environments, robust cloud security is no longer optional-it is paramount. The Practical Cloud Security Handbook is your essential guide to navigating this complex landscape, empowering you to secure digital assets effectively and confidently in the era of distributed systems and cloud-native architectures.This handbook systematically guides you from cloud security fundamentals, including the shared responsibility model, through various cloud-native architectural patterns and top cloud workloads like IAM, VPC, and containerization. You will gain a deep understanding of core security concepts, such as encryption and protocols, and then explore the practical, multi-cloud configurations for securing storage, network services, and identity access management across AWS, Azure, IBM, and GCP. The book progresses to vital operational security aspects like monitoring, encryption application, and robust testing. It further explores modern approaches like security as code, offering best practices for both cloud-native and non-cloud-native implementations, integrates DevSecOps principles, and concludes with crucial compliance and regulatory considerations.Upon completing this handbook, you will possess a comprehensive, hands-on understanding of cloud security, enabling you to design, implement, and maintain secure cloud environments and confidently address today's complex cybersecurity challenges.WHAT YOU WILL LEARN● Secure workloads across AWS, Azure, GCP, and IBM.● Implement Zero Trust security architectures.● Use infrastructure as code for secure deployments.● Set up DevSecOps pipelines with Jenkins and GitHub.● Explore IAM, encryption, and network security controls.● Detect and respond to security breaches effectively.● Apply DevSecOps, Zero Trust, and compliance best practices.WHO THIS BOOK IS FORThis book is designed for cloud engineers, DevOps professionals, security analysts, and IT architects. It assumes a foundational understanding of cloud computing concepts and basic IT security principles for aspiring cloud security professionals.
Llmops
Here's the thing about large language models: they don't play by the old rules. Traditional MLOps completely falls apart when you're dealing with GenAI. The model hallucinates, security assumptions crumble, monitoring breaks, and agents can't operate. Suddenly you're in uncharted territory. That's exactly why LLMOps has emerged as its own discipline. LLMOps: Managing Large Language Models in Production is your guide to actually running these systems when real users and real money are on the line. This book isn't about building cool demos. It's about keeping LLM systems running smoothly in the real world. Navigate the new roles and processes that LLM operations require Monitor LLM performance when traditional metrics don't tell the whole story Set up evaluations, governance, and security audits that actually matter for GenAI Wrangle the operational mess of agents, RAG systems, and evolving prompts Scale infrastructure without burning through your compute budget
Information Security and Privacy
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14-16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed andselected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.
Computational Science and Its Applications - Iccsa 2025 Workshops
The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025.. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
Information Security and Privacy
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14-16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed andselected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.
Establishing Security Operations Center
Cyber threats are everywhere and constantly evolving. Data breaches, ransomware, and phishing have become everyday news. This book offers concepts and practical insights for setting up and managing a security operations center. You will understand why SOCs are essential in the current cyber landscape, how to build one from scratch, and how it helps organizations stay protected 24/7.This book systematically covers the entire lifecycle of a SOC, beginning with cybersecurity fundamentals, the threat landscape, and the profound implications of cyber incidents. It will guide you through why SOCs are critical in today's cyber landscape, how to build one from the ground up, tools, roles, and real-life examples from the industry. The handling of security incidents before they turn into threats can be effective through this book. The entire ecosystem of management of security operations is covered to effectively handle and mitigate them. Upon completing this guide, you will possess a holistic understanding of SOC operations, equipped with the knowledge to strategically plan, implement, and continuously enhance your organization's cybersecurity posture, confidently navigating the complexities of modern digital defense. The book aims to empower the readers to take on the complexities of cybersecurity handling.WHAT YOU WILL LEARN● Understand SOC evolution, core domains like asset/compliance management, and modern frameworks.● Implement log management, SIEM use cases, and incident response lifecycles.● Leverage threat intelligence lifecycles and proactive threat hunting methodologies.● Adapt SOCs to AI/ML, cloud, and other emerging technologies for future resilience.● Integrate SOC operations with business continuity, compliance, and industry frameworks.WHO THIS BOOK IS FORThe book serves as a guide for those who are interested in managing the facets of SOC. The responders at level 1, analysts at level 2, and senior analysts at level 3 can gain insights to refresh their understanding and provide guidance for career professionals. This book aims to equip professionals, from analysts to executives, with the knowledge to build scalable, resilient SOCs that are ready to confront emerging challenges.
Certified Ethical Hacker (Ceh) Study Guide
The CEH exam is not an enjoyable undertaking. This grueling, exhaustive, challenging, and taxing exam will either leave you better prepared to be the best cyber security professional you can be. But preparing for the exam itself needn't be that way. In this book, IT security and education professional Matt Walker will not only guide you through everything you need to pass the exam, but do so in a way that is actually enjoyable. The subject matter need not be dry and exhausting, and we won't make it that way. You should finish this book looking forward to your exam and your future. To help you successfully complete the CEH certification, this book will bring penetration testers, cybersecurity engineers, and cybersecurity analysts up to speed on: Information security and ethical hacking fundamentals Reconnaissance techniques System hacking phases and attack techniques Network and perimeter hacking Web application hacking Wireless network hacking Mobile, platform, IoT, and OT hacking Cloud computing Cryptography Penetration testing techniques Matt Walker is an IT security and education professional with more than 20 years of experience. He's served in a variety of cyber security, education, and leadership roles throughout his career.
Computational Science and Its Applications - Iccsa 2025 Workshops
The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
Computational Science and Its Applications - Iccsa 2025 Workshops
The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
Computer Networks
The book computer Networks provides a comprehensive introduction to the concepts and principles of data communication and networking. It covers the fundamental components involved in data transmission, the various types of computer networks, and their architectures. The book introduces key protocols and standards and explains how data travels across different layers of the OSI and TCP/IP models. It explores physical transmission methods, error detection and correction techniques, switching methods, and multiple access strategies. It also delves into network layer functions such as routing and addressing, transport layer protocols like TCP and UDP, and application-level services including DNS, email, FTP, and web communication. Security mechanisms like PGP and SSH are also discussed. The book is structured to build foundational knowledge and is widely used in academic settings for undergraduate computer science and engineering courses.
Computational Science and Its Applications - Iccsa 2025 Workshops
The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
Computational Science and Its Applications - Iccsa 2025 Workshops
The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
Artificial Intelligence in Image Processing
Artificial Intelligence in Image Processing: Concepts, Techniques, and Applications provides a comprehensive exploration of how AI revolutionizes the field of digital imaging. It starts by tracing the evolution of image processing from manual techniques to advanced AI-driven methods. The book introduces foundational concepts in both image processing and AI, and covers key techniques including CNNs, GANs, RNNs, transfer learning, and autoencoders. It addresses core applications such as classification, segmentation, enhancement, 3D imaging, and medical diagnostics. Real-world case studies across healthcare, industry, and surveillance illustrate practical deployments. Ethical considerations, technical challenges, and future trends-including edge computing, AR/VR integration, and human-AI collaboration-are also examined, making this book an essential guide for students, researchers, and professionals in the AI and imaging domains.
Military Operations in Cyberspace
In the book cyberspace capabilities, threats, and attacks are described. The principles of the cyberspace operations' missions, characteristics, design, and planning are presented. The cybersecurity organizations and forces are reported. The bases of the decision-making process, operations execution, and targeting in cyberspace are formulated. The principles of cyberspace operations support, synchronization, and assessment are outlined. The role of cybersecurity in Homeland, critical infrastructure protection, and other operations is depicted. The cybersecurity strategy, guidance, and policy in the U.S., NATO, the European Community, and the Republic of Moldova are shown.The book is recommended for civil and military specialists from academic, scientific, and application levels, for license, master's, and PhD degree students.
Computational Science and Its Applications - Iccsa 2025 Workshops
The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
Computational Science and Its Applications - Iccsa 2025 Workshops
The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
Computational Science and Its Applications - Iccsa 2025 Workshops
The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
Computational Science and Its Applications - Iccsa 2025 Workshops
The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
Computational Science and Its Applications - Iccsa 2025 Workshops
The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
Computational Science and Its Applications - Iccsa 2025 Workshops
The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
AI vs. Humanity - The Battle for Human Relevance
The AI revolution is here-will you adapt or be left behind? Artificial Intelligence is reshaping industries, automating jobs, and redefining what it means to be human. As AI advances at an unprecedented pace, one question remains: Where do we fit in?In this eye-opening book, certified AI consultant and strategist Christopher Uchenwa unpacks the challenges and opportunities of our AI-driven future. Discover: - How AI is transforming jobs, businesses, and everyday life- The biggest threats and ethical dilemmas AI presents- The key skills you need to stay relevant in an AI-powered world.- How businesses can harness AI for innovation and growthThis is more than a book about technology, it's your blueprint for thriving in the age of AI.
AI vs. Humanity - The Battle for Human Relevance
The AI revolution is here-will you adapt or be left behind? Artificial Intelligence is reshaping industries, automating jobs, and redefining what it means to be human. As AI advances at an unprecedented pace, one question remains: Where do we fit in?In this eye-opening book, certified AI consultant and strategist Christopher Uchenwa unpacks the challenges and opportunities of our AI-driven future. Discover: - How AI is transforming jobs, businesses, and everyday life- The biggest threats and ethical dilemmas AI presents- The key skills you need to stay relevant in an AI-powered world.- How businesses can harness AI for innovation and growthThis is more than a book about technology, it's your blueprint for thriving in the age of AI.
Computational Science and Its Applications - Iccsa 2025 Workshops
The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.
The Future of Hacking
In a world, where cyber threats evolve daily, the line between hacker and hero is thinner than you think. Hacking is no longer just a shadowy underground activity-it's an essential part of our digital world. The Future of Hacking explores the evolving landscape of cybersecurity, ethical hacking, and digital defense, revealing how hackers protect as much as they attack. Drawing on extensive research and expert interviews from around the world, Laura Scherling uncovers the real-world impact of cybercrime, internet freedom, and digital policy. This accessible yet deeply researched book challenges misconceptions about hacking, highlights the work of those defending our digital future, and helps readers understand why cybersecurity is now everyone's concern. The future of hacking is here.
The vCISO Playbook
The vCISO Playbook: How Virtual CISOs Deliver Enterprise-Grade Cybersecurity to Small and Medium Businesses (SMBs) Protect Your Data with a vCISO Working for Your Business The authors of this Guide have focused on two principal audiences: Small and Midsized Businesses (SMBs) and Virtual Chief Information Security Officers (vCISOs). vCISOs in this context may also be referred to as Subject Matter Experts (SMEs). By extension, we include in our audience trusted professional advisers to SMBs, such as attorneys, investment bankers, and financial consultants. Our combined experience in cybersecurity and small business matters spans over 50 years, and we have concentrated on the intersection of the needs of SMBs with the capabilities of vCISOs. We are versed in the growing necessity of SMBs in the supply chains of critical infrastructure to demonstrate that they have taken steps to assure their ability to prevent or recover from cyber-attacks. Note that we have included two Appendices with public source information on the DHS/CISA list of the 16 critical infrastructure sectors, as well as SMBs' participation in their supply chains. Appendix 3 sets out the features of Beta Centauri℠, our proprietary program to create an efficient working relationship between SMBs and vCISOs. In Appendix 4, we have included summaries of four articles published recently in Cyber Defense Magazine on the stages of successful relationships between SMBs and vCISOs. Typically, SMBs have experienced a fundamental conflict between the importance of managing the risk of cyber attacks and the cost of having a full time Chief Information Security Officer (CISO). To begin with, the basic techniques of cyber risk management can be overwhelming to owners and managers of SMBs; they are complex and tend to change quickly as new forms of attack and response develop. According to Bank of America's most recent Small Business Report, while 71% of small businesses report that they have digitally optimized their operations over the past 12 months, only 21% have added cybersecurity measures to their businesses. Of mid-sized businesses, 90% report that cybersecurity is a threat to their business, but only 63% are keeping software up to date, 60% are investing in digital security systems, and a paltry 50% are investing in employee security training [1]. Unfortunately, the myth persists that SMBs are too small to be targets for cyber criminals. On the contrary, they are often low-hanging fruit, with a combination of lax cybersecurity measures making them subject to existential threats by such attack modes as ransomware. According to a Microsoft report conducted by research firm Bredin, one-third of SMBs suffered a cyber attack during the past year (2024), with the average cost of each incident amounting to over $250,000.[2] The potential adverse impact of a ransomware attack or data breach can be devastating. It has been observed that it would have a similar effect on a company in the critical infrastructure supply chain as a provider of services requiring security clearances for employees. If a vital employee suffered an identity theft incident, they would be unable to access the government secure facility to carry out their work. [1] Bank of America. (2024). 2024 Business Owner Report. https: //business.bofa.com/en-us/content/2024-business-owner-report.html [2] https: //cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/SMBCybersecurity-Report-Final.pdf
Unleashing the Power of Blockchain and Iot for Water Informatics
You Have a New Memory
NATIONAL BESTSELLER An open-hearted interrogation of our digital selves, braiding cultural criticism, memoir, and narrative musings into an exploration of identity, girlhood, media, tech, nature and "finding the depth and beauty in the fucked-up world we live in" from a writer, artist, and influencer (Phoebe Bridgers). YOU HAVE A NEW MEMORY is a deeply human inventory of the digital sphere, a searing analysis of the present and a prescient assessment of the future. In her highly anticipated debut, Aiden Arata brings us raw reportage from the liminal space between online and offline worlds, illuminating how we got here and where to go next. With high-res, cosmic vision and razor-sharp wit, this kaleidoscopic collection of essays artfully explores what it means to exist on the internet. Arata exposes influencer grifts from the perspective of a grifter, digs into the alluring aesthetic numbness of stay-at-home girlfriend content creators, and interrogates our online fetishization of doom to grapple with the real-world apocalypse. Arata is the wry, unexpected voice we need to navigate existing simultaneously as creators, consumers, and products in our increasingly braver and newer world.
Artificial Intelligence Paradigms for Application Practice
This book proposes practical application paradigms for deep neural networks, aiming to establish best practices for their real-world implementation.