Integrity and Internal Control in Information Systems isa state-of-the-art book that establishe...
Information security is receiving a great deal of attention ascomputers increasingly process mo...
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group...
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
With the rapid growth in the use of computers to manipulate, process, and reason about multimedia...
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Informat...
Information security concerns the confidentiality, integrity,and availability of information pr...
The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was ...
New technology is always evolving and companies must haveappropriate security for their busines...
Motivation Modem enterprises rely on database management systems (DBMS) to collect, store and man...
Dear readers, Although it is well-known that confidentiality, integrity and availability are high...
Information Hiding: Steganography and Watermarking -Attacks and Countermeasures deals with info...