Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan leveres før jul.
This class-tested textbook will provide in-depth coverage of the fundamentals of machine learning, with an exploration of... Læs mere
Bemærk: Kan ikke leveres før jul.
Describes the essential software security concepts that are needed to conduct relevant and effective tests. This book considers foundation concepts, processes and techniques in... Læs mere
Bemærk: Kan ikke leveres før jul.
The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions.
Bemærk: Kan ikke leveres før jul.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies.
Bemærk: Kan ikke leveres før jul.
This book addresses security analytics for the Internet of Everything. It provides a big picture on the concepts, techniques, applications, and open... Læs mere
Bemærk: Kan ikke leveres før jul.
This book present the principles of cloud computing security. From a definition of terms to key issues for service contracts, it's a must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional computing assets.
Bemærk: Kan ikke leveres før jul.
There is a resurgence of interest in the security of data transmission in wireless systems from physical layer point of view. To enhance the security and data reliability in cooperative wireless networks, this book provides new solutions for these problems.
Bemærk: Kan ikke leveres før jul.
Discusses network architecture, the functions of layers in a typical network, and network based attacks including header, protocol, and authentication attacks. This book... Læs mere
Bemærk: Kan ikke leveres før jul.
This book, written for practitioners in the field, provides tangible, cost effective, and thus pragmatic means to mitigate key risks while leveraging built-in cloud capabilities and overarching principles of effective system design.