In order to perform effective analysis of today's information security systems, numerous components must be taken into consideration. This book presents a well-
This book constitutes the proceedings of the 14th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2015, held
This book constitutes the refereed proceedings of the Third International Conference on Cryptography and Security Systems, CSS 2014, held in Lublin, Poland, in
Safety-critical devices, whether medical, automotive, or industrial, are increasingly dependent on the correct operation of sophisticated software. Many standar
This book introduces the Cognitive Early Warning Predictive System (CEWPS ) as the new digital immune system. Similar to the human immune system, CEWPS relies o