Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures.
Bemærk: Kan ikke leveres før jul.
This book presents a unique, step-by-step approach for monitoring, detecting, analyzing and mitigating complex network cyber threats.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Rising concerns about the security of our data have made quantum cryptography a very active research field in recent years. Quantum cryptographic protocols promise everlasting security by exploiting distinctive quantum properties of nature.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book introduces game theory as a means to conceptualize, model, and analyze cyber deception.
Bemærk: Kan ikke leveres før jul.
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting.
Bemærk: Kan ikke leveres før jul.
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain.
Bemærk: Kan ikke leveres før jul.