Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance... Læs mere
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic... Læs mere
Bemærk: Kan ikke leveres før jul.
This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contributions related to current defensive approaches of various attacks on OSNs.
Bemærk: Kan ikke leveres før jul.
This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud... Læs mere
Bemærk: Kan ikke leveres før jul.
Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in cloud computing.
Bemærk: Kan ikke leveres før jul.
This book is designed for readers who have an interest in the cyber security domain, including students... Læs mere
Bemærk: Kan ikke leveres før jul.
The book will review how new and old privacy-preserving techniques can provide practical protection... Læs mere
Bemærk: Kan leveres før jul.
Bemærk: Kan leveres før jul.
And, if the actors behind the cloud know everything: what is still private today, and are there any personal secrets at all when the "gods" behind the cloud possibly know us better than our friends and family?The book uses a wealth of case studies (e.g.
Bemærk: Kan ikke leveres før jul.
This book focuses on security issues in the IoT environment. It analyzes the security problems of each layer separately and try to identity solutions. It also analyzes the integration and scalability issues with the cross-layer architecture of IoT in detail.
Bemærk: Kan ikke leveres før jul.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics