This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal…
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thoug…
In diesem Open-Access-Buch werden Erfahrungen zur Zusammenarbeit und zum Wissensmanagement verschiedenster staatlicher, gemeinnütziger und privater Akteure in der Flüchtlingslage 2015/16 aufbereitet, mit praxisnahen Beispielen angereichert und um Übungen zur Vorbereitung auf zukünftige Lagen ergänzt. Die damalige Lage stellte die Beteiligten vor große Herausforderungen, sowohl im Hinblick…
This open access book examines Russia-China relations across a variety of civilian and military areas of cooperation. Leading experts in the field present empirical case studies covering a wide range of strategic cooperation areas between Russia and China, such as technological, military, economic and political cooperation. The contributing authors shed new light on Chinese and Russian strategi…
This open access book summarizes knowledge about several file systems and file formats commonly used in mobile devices. In addition to the fundamental description of the formats, there are hints about the forensic value of possible artefacts, along with an outline of tools that can decode the relevant data. The book is organized into two distinct parts: Part I describes several differen…
This volume examines the relationship between privacy, surveillance and security, and the alleged privacy–security trade-off, focusing on the citizen’s perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implemen…
Introduction: Securitizing global concerns -- From Securitization to macrosecuritization -- Security in China -- The Cold War then and now -- Anti-nuclear discourse in China -- Climate security with Chinese characteristics -- China's War on Terror -- Potential Chinese
This open access book addresses the protection of privacy and personality rights in public records, records management, historical sources, and archives; and historical and current access to them in a broad international comparative perspective. Considering the question “can archiving pose a security risk to the protection of sensitive data and human rights?”, it analyses data security and …