Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Provides a compilation of the fundamental knowledge, skills, techniques, and tools required of IT security professional. It reflects the changes to the CBK in response to new laws and evolving technology.
Bemærk: Kan ikke leveres før jul.
Shows how to strategically maximize a limited security budget without compromising the quality of risk management initiatives. This book describes how to manage the... Læs mere
Bemærk: Kan ikke leveres før jul.
Reveals those aspects of hacking least understood by network administrators. This handbook analyzes subjects through a... Læs mere
Bemærk: Kan ikke leveres før jul.
Group theoretic problems appear to be the most promising source of hard computational problems for deploying cryptographic constructions. This title focuses on the specifics... Læs mere
Bemærk: Kan ikke leveres før jul.
Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise
Bemærk: Kan ikke leveres før jul.
Offers information needed to track, monitor, investigate, document, and preserve both... Læs mere
Bemærk: Kan ikke leveres før jul.
Containing data on number theory, encryption schemes, and cyclic codes, this textbook presents coding theory, construction, encoding, and... Læs mere
Bemærk: Kan ikke leveres før jul.
This book discusses the current technologies of cryptography using DNA computing. It provides a judicious mix of concepts, solved examples and real life case studies.
Bemærk: Kan ikke leveres før jul.
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. This handbook... Læs mere
Bemærk: Kan ikke leveres før jul.
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the... Læs mere
Bemærk: Kan ikke leveres før jul.
This book covers the entire research scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications with source codes.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, in May 2017. The 56 full papers presented in this volume were carefully reviewed and selected from 127 submissions.