Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book constitutes the proceedings of the 16th IFIP WG 11.12... Læs mere
Bemærk: Kan ikke leveres før jul.
Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal... Læs mere
Bemærk: Kan leveres før jul.
5G technology is the next step in the evolution of wireless communication. However, it also introduces new cyber risks. 5G networks are expected to be much more complex,... Læs mere
Bemærk: Kan ikke leveres før jul.
This book explores all the aspects of implementing and maintaining a PKI and reflects decades of hard won experience in PKI, IT, business, government agencies and... Læs mere
Bemærk: Kan leveres før jul.
This book discusses the challenges associated with the increased accessibility to 5G and broader usage with associated vulnerability in developing countries.
Bemærk: Kan ikke leveres før jul.
This book presents chapters from diverse range of authors on different aspects of how Blockchain and IoT are converging and the impacts of these developments.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. Covering... Læs mere
Bemærk: Kan ikke leveres før jul.
What every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs.
Bemærk: Kan ikke leveres før jul.
Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, steal their information,... Læs mere
Bemærk: Kan ikke leveres før jul.
Explains the methodologies, framework, and 'unwritten conventions' that ethical hacks should employ to provide the maximum value to... Læs mere
Bemærk: Kan ikke leveres før jul.
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets.