for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to... Læs mere
Bemærk: Kan ikke leveres før jul.
Society has the need for secure software tools. Unfortunately, many of these tools are not built with security in mind or are not developed with attention to security... Læs mere
Bemærk: Kan ikke leveres før jul.
This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud and IoT applications.
Bemærk: Kan ikke leveres før jul.
The purpose of this edited book is to present and showcase the basic fundamentals, applications, and integration of both IoT and... Læs mere
Bemærk: Kan ikke leveres før jul.
This book provides a comprehensive study of the security and privacy research advancements in Internet of Things. The book lays the context for discussion... Læs mere
Bemærk: Kan ikke leveres før jul.
This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book explores the cultural phenomena of sexting and revenge pornography – looking at motivations for... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world... Læs mere
Bemærk: Kan ikke leveres før jul.
This book introduces reinforcement learning, and provides novel ideas and use cases to demonstrate the benefits of using reinforcement learning for Cyber Physical Systems. Two important case studies on applying reinforcement learning to cybersecurity problems are included.
Bemærk: Kan ikke leveres før jul.
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions... Læs mere