Meet the world''s top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you..
Countering flexible and persistent adversaries requires empowered defenders The Active Cyber Defense Cycle empowers cyber defenders to unify their..
Since the entry into force of the Lisbon Treaty, data protection has been elevated to the status of a fundamental right in the European Union and is..
Кевин Митник по праву считается самым неуловимым мастером компьютерного взлома в истории. Он проникал в сети и компьютеры крупнейших мировых компаний и..
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations,..
Data concealment has evermore been necessary. Encryption is a method used for most data communication in modern times but steganography has been used..
This paper examines the phenomenon of cybercrime, as a serious hazard of new, digital society. Different forms of cybercrime are described, accompanied..
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and..
Smartphones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features..