for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The design of authentication protocols is discussed in depth, and this would also include looking into the role of formal verification in the design of security protocols.
Bemærk: Kan ikke leveres før jul.
This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15... Læs mere
Bemærk: Kan ikke leveres før jul.
This book explores the fundamentals and applications of Blockchain technology. Readers will learn about the decentralized peer-to-peer network, distributed ledger, and the trust model that defines Blockchain technology.
Bemærk: Kan ikke leveres før jul.
Aspects of Personal Privacy in Communications is mostly about understanding what privacy is and some of the technologies... Læs mere
Bemærk: Kan leveres før jul.
Big Data Analytics and Intelligence is essential reading for researchers and experts working in the fields of health care, data science, analytics, the internet of things, and information retrieval.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Once a seemingly unambiguous benefit to society, the internet is now the basis for invasions of privacy, massive concentrations of power, and... Læs mere
Bemærk: Kan ikke leveres før jul.
This self-contained 2006 text introduces the principles and techniques of quantum cryptography, with specific focus on secret-key distillation. With its... Læs mere
Bemærk: Kan ikke leveres før jul.
Learn how information theoretic approaches can inform the design of more secure information systems and networks with this expert guide.... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke garanteres før jul.
This book gives a definitive account of the politics of personal information in West Germany during the 1970s and 1980s, highlighting the growing role of personal information as a tool for social governance.