Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to... Læs mere
Bemærk: Kan ikke leveres før jul.
Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into how this steganography began and evolved... Læs mere
Bemærk: Kan ikke leveres før jul.
In a clear, concise, and modular format, this book introduces the fundamental concepts and mathematics of information and coding theory.
Bemærk: Kan ikke leveres før jul.
The merger of Internet of Things (IoT) and blockchain technology is a step towards creating a verifiable, secure and permanent method of recording data processed by “smart” machines. This book explores the platforms and applications of blockchain-enabled IoT.
Bemærk: Kan ikke leveres før jul.
This book covers technical details of mobile devices and transmissions as well as forensic methods for extracting evidence. There are books on specific issues like Android Forensics or iOS forensics. But there is not currently a book that covers all the topics this book will.
Bemærk: Kan ikke leveres før jul.
This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter home with harmful intentions.
Bemærk: Kan ikke leveres før jul.
This book has comprehensive coverage of the principles, basic concepts, structure, modelling, practices, and circuit applications of nanoelectronics in hardware/software security. It will also cover the future research directions in this domain.
Bemærk: Kan leveres før jul.
The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry.
Bemærk: Kan ikke leveres før jul.
This book covers decades of digital eavesdropping and manipulation of agencies to Stuxnet, the world’s first use of digital code... Læs mere
Bemærk: Kan leveres før jul.
Provides comprehensive coverage of block codes and techniques using step-by-step explanations and easy-to-follow mathematics. Including numerous examples and with solutions available online, it is ideal for introductory senior undergraduate and graduate coding courses.
Bemærk: Kan ikke leveres før jul.
They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two... Læs mere