Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out various malicious activities. This book will be... Læs mere
Bemærk: Kan leveres før jul.
This book provides a comprehensive introduction to the foundations of cryptography and network security. As well as a thorough presentation of the evolution of the... Læs mere
Bemærk: Kan ikke leveres før jul.
This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition towards the quantum computing application in various sectors.
Bemærk: Kan ikke leveres før jul.
The theory developed for Z2Z4-additive codes is the starting point for much generalization about codes over mixed alphabets.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 37th IFIP TC 11... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010.
Bemærk: Kan ikke leveres før jul.
This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm.
Bemærk: Kan ikke leveres før jul.
Covering cyber security and Industry 4.0 concepts from a management and operational level, this book connects the topics of Industry 4.0 and cyber security together seamlessly. It discusses both the risks and solutions of using cyber security techniques for Industry 4.0.
Bemærk: Kan ikke leveres før jul.
An explanation of the five pillars or battlefields of Cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. The five battlefields include Economics, Technology, Information, Education and Leadership.
Bemærk: Kan ikke leveres før jul.
This book teaches you everything that you need to know about preparing your company for a potential data breach. It is meant for the everyday business owner and makes these concepts simple to understand and apply.
Bemærk: Kan ikke leveres før jul.
This book discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological,... Læs mere