This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identificatio...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Loe edasi...
(Ilmumisaeg: 10-Oct-2025, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031991394)
This book provides a comprehensive introduction to blockchain and distributed ledger technology (DLT). Intended as an applied guide for hands-on practitioners, this book includes detailed examples and...Loe edasi...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Loe edasi...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Loe edasi...
This book covers the entire spectrum of hardware design including integrated circuits, embedded systems, and design automation tools. It also captures recent advances in various attack and defense methods. This book addresses vario...Loe edasi...
Edge Computing and Intelligence is a new technical discipline that researches anddevelops theories, methods, technologies, and application systems for providing the fastand efficient processing and intelligent decision using the big data generated fr...Loe edasi...
In this smart era, business innovation and industrial intelligence are making the way for a smart future in which smart factories, intelligent machines, networked processes, edge computing, blockchain technology, and Big Data (including Data Science...Loe edasi...
Explore practical cryptographic methods using Python to secure data, encrypt communications, and implement real-world security techniques for modern applications Key Features Learn cryptographic techniques with Python for real-...Loe edasi...
(Ilmumisaeg: 25-Sep-2025, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031998492)
Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret key algorithms (symmetric ciphers) have been designed as Feistel networks, and it is possible to design many others. The most fam...Loe edasi...
Data Analytics using Machine Learning Techniques on Cloud Platforms examines how machine learning and cloud computing combine to drive data-driven decision-making across industries. Covering ML techniques, cloud-based analytics tools, and security...Loe edasi...
This set of story-based learning projects links performances and tasks with computing codes to show how a machine translates our goals into its language There is a global need to become less fearful of coding, as it improves communi...Loe edasi...
What is the difference between a code and a cipher? How did Caesar send secret messages? How does RSA end-to-end encryption actually work? In this fascinating little book, packed with numerous helpful illustrations and worked examples, polymath Stev...Loe edasi...
This book explores the critical intersection of human behavior, cybersecurity, and the transformative potential of quantum technologies. It delves into the vulnerabilities and resilience of human intelligence in the face of cyber threats, examinin...Loe edasi...
This book explores the critical intersection of human behavior, cybersecurity, and the transformative potential of quantum technologies. It delves into the vulnerabilities and resilience of human intelligence in the face of cyber threats, examinin...Loe edasi...
Like art appreciation and music appreciation, this code appreciation book invites the readers to look relaxedly into major programming concepts used in many disciplines through short stories set in alphabetical order. Some students fear technology...Loe edasi...
Mathematical Foundations of Blockchains is a two-volume work on blockchains. Blockchain is a novel paradigm for a distributed ledger. Volume 1 is on the fundamentals of blockchains and consists of an overview of blockchains, essential eleme...Loe edasi...
Mathematical Foundations of Blockchains is a two-volume work on blockchains. Blockchain is a novel paradigm for a distributed ledger. Volume 1 is on the fundamentals of blockchains and consists of an overview of blockchains, essential elements of bl...Loe edasi...