for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book proposes a new model—the IrisCryptoAgentSystem (ICAS)—based on a biometric method for authentication using the iris of the eye. It explains how... Læs mere
Bemærk: Kan ikke leveres før jul.
This book addresses the security issues in IoT devices with respect to different technological paradigms of IoT. This book helps readers understand the underlying concepts of IoT, various security challenges, and real-time application areas of the domain.
Bemærk: Kan ikke leveres før jul.
This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using... Læs mere
Bemærk: Kan ikke leveres før jul.
This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. This book offers more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research.
Bemærk: Kan ikke leveres før jul.
Offers an approach to developing and implementing relevant security metrics essential for... Læs mere
Bemærk: Kan ikke leveres før jul.
This book covers Blockchain from a scientific perspective as to what are the underlying principles and how it enables applications to survive and surf on its shoulder.
Bemærk: Kan ikke leveres før jul.
The new fifth edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and... Læs mere
Bemærk: Kan ikke leveres før jul.
Explaining the complex sources of risk for any organization, this work provides guidance and strategies to prevent... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.