Søgning på underkategorier- og emner:
Bemærk: Kan ikke garanteres før jul.
In this first part of the INFINITECH book series, the principles of the modern economy that lead to the modern financial sector and the FinTech’s the most disruptive areas in today’s global economy are discussed.
Bemærk: Kan ikke leveres før jul.
The ebook edition of this title is Open Access and freely available to read online. This third and final part of the INFINITECH book series begins by providing a definition for FinTech, namely: the use of technology to underpin the delivery of financial services.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Microsoft Azure is the fastest growing cloud platform in the world, with huge demand from both enterprises and startups alike. Its scalability and elasticity keep costs low.... Læs mere
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Bemærk: Kan ikke leveres før jul.
The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the desired security properties, Tamarin either verifies the protocol or provides counter examples witnessing attacks.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book highlights how AI agents and Large Language Models (LLMs) are set to revolutionize the finance and trading sectors in unprecedented ways.
Bemærk: Kan ikke leveres før jul.
This book strives to comprehensively explain Web 3.0 and tokenization technologies from theory to practice, from concepts to cases, and from opportunities to challenges.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.