Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The book presents an integrated view of blockchain for systems security and privacy. It identifies issues of utilizing blockchain in applications... Læs mere
Bemærk: Kan ikke leveres før jul.
This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis, to deliver transparency of the strengths, weaknesses, opportunities, and threats encompassing each of these countries' cybersecurity public policy.
Bemærk: Kan ikke leveres før jul.
This book focuses on various authorization and access control techniques, threats and attack modelling including overview of open... Læs mere
Bemærk: Kan ikke leveres før jul.
This book will address the cybersecurity and cooperate governance challenges associated with enterprises, providing a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area.
Bemærk: Kan ikke leveres før jul.
The text presents in depth coverage of theoretical concepts, and applications and advances in the field of... Læs mere
Bemærk: Kan ikke leveres før jul.
The text covers concepts of cyber security through quantum computing and quantum cryptography in a single volume. It will be a useful text for... Læs mere
Bemærk: Kan ikke leveres før jul.
This third edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, where, what, when, why and how in the investigation of cybercrime.
Bemærk: Kan ikke leveres før jul.
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out various malicious activities. This book will be... Læs mere
Bemærk: Kan ikke leveres før jul.
This book offers approaches for cybersecurity and cyber defense via Blockchain technology... Læs mere
Bemærk: Kan ikke leveres før jul.
Securing the Digital World: A Comprehensive Guide to Multimedia Security is indispensable reading in today's digital age. With the outbreak of digital range and ever-evolving cyber threats, the demand to protect multimedia data has never been more imperative.
Bemærk: Kan ikke leveres før jul.
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.
Bemærk: Kan ikke leveres før jul.
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.