Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book introduces physics students to concepts and methods of finance. Juxtaposing the key methods to applications in both physics and finance articulates both differences and common features, this gives students a deeper understanding of the underlying ideas.
Bemærk: Kan ikke leveres før jul.
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting.
Bemærk: Kan ikke leveres før jul.
This book presents a complete and accurate study of arithmetic and algebraic circuits. The first part offers a review of all important basic concepts: it describes simple circuits for the implementation of some basic arithmetic operations;
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
It then turns to improved decision making in cyber security, also known as cyber situational awareness, by analysing security events and comparing data mining techniques, specifically classification techniques, when applied to cyber security data.
Bemærk: Kan ikke leveres før jul.
This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28 full papers presented were carefully reviewed and selected from 112 submissions.
Bemærk: Kan ikke leveres før jul.
This book constitutes the proceedings of the 15th IFIP WG 11.12... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics.
Bemærk: Kan ikke leveres før jul.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers.
Bemærk: Kan ikke leveres før jul.
After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs.