Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
A quiet revolution is taking place within the computer ecosystem; one that will change the way we do business on the internet –... Læs mere
Bemærk: Kan ikke leveres før jul.
Presents insights on the current state of security and privacy in the Internet world. The book contains a brief introduction to some of the most used open-source intelligence... Læs mere
Bemærk: Kan ikke leveres før jul.
This handbook of formal analysis in cryptography is very important for secure communication and processing of information. It introduces readers to several formal verification methods and software used to analyse cryptographic protocols.
Bemærk: Kan ikke leveres før jul.
This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education.
Bemærk: Kan leveres før jul.
This book discusses the advancements in IoT and Cyber-Physical Systems Forensics. This book not only presents numerous case stories from a global perspective, but it also compiles a large amount of literature and research from a database.
Bemærk: Kan leveres før jul.
This reference text presents the important components for grasping the potential of social computing with an emphasis on concerns, challenges, and... Læs mere
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book summarizes the progress in the research and provides step by step guide towards every aspect of cloud and other connected technologies. The book also covers the security aspects in the field of Cloud computing, Fog/Edge computing, IoT, etc.
Bemærk: Kan leveres før jul.
6G-enabled IoT and AI for Smart Healthcare: Challenges, Impact, and Analysis offers the fundamentals, history, reality, and challenges faced in the smart healthcare industry today. It discusses the concepts, tools, and techniques of smart healthcare as well as the analysis used.
Bemærk: Kan leveres før jul.
In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
Bemærk: Kan leveres før jul.
This practical book provides a comprehensive guide to help you master ASM. Cybersecurity engineers, system administrators, and network administrators will explore key components, from networks and cloud systems to human factors.
Bemærk: Kan leveres før jul.
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at... Læs mere