(Ilmumisaeg: 06-Oct-2006, Hardback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783540245025)
In todays unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology no...Loe edasi...
(Ilmumisaeg: 05-Nov-2024, Multiple-component retail product, Kirjastus: Springer-Verlag New York Inc., ISBN-13: 9780387286020)
The Handbook of Security will build on the existing Handbook of Data Communications and Networks, and The Complete Handbook of the Internet. It will try to cover every aspect of computer and network security. This will include an analysis of the phys...Loe edasi...
(Ilmumisaeg: 09-Aug-2024, Hardback, Kirjastus: Springer-Verlag New York Inc., ISBN-13: 9780387271590)
Public Key Infrastructures (PKI) are a trust management technology for public keys, consisting of several interconnected Certifying Authorities (CAs). The CAs issue certificates that establish ownership of public keys, which can be used to support...Loe edasi...
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also disc...Loe edasi...
This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented...Loe edasi...
This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It examines theories and various state-of-the-art technologies and methodologies. Starting with a survey of the latest soluti...Loe edasi...
Iván Palomares Carrascosa, Harsha Kumara Kalutarage, Yan Huang
Sari: Data Analytics
(Ilmumisaeg: 09-Aug-2017, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319594385)
The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data scie...Loe edasi...
In 25 concise steps, you will learn the basics of blockchain technology. Mathematical formulas, program code, and computer science jargon are not used. No previous knowledge in computer science, mathematics, programming, or cryptography is re...Loe edasi...
This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving d...Loe edasi...
(Ilmumisaeg: 12-Jan-2017, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319490182)
This book introduces readers to various threats faced during design and fabrication by todays integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or IC Overproduction, insertion of maliciou...Loe edasi...
(Ilmumisaeg: 09-Jan-2017, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319490243)
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers...Loe edasi...
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethica...Loe edasi...
Pro Oracle Identity and Access Management Suite presents a process-based approach to implementing Oracle’s Identity and Access Management Suite. Learn everything from basic installation through t...Loe edasi...
When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to manipulate, there are still critical security bugs that can be exploited. In response to this issue, author Kunal Relan offers a c...Loe edasi...
Cliff Wang, Ryan M. Gerdes, Yong Guan, Sneha Kumar Kasera
(Ilmumisaeg: 26-Oct-2016, Hardback, Kirjastus: Springer-Verlag New York Inc., ISBN-13: 9781493965991)
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Availabl...Loe edasi...
This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industr...Loe edasi...
(Ilmumisaeg: 04-Oct-2016, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319411859)
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and pract...Loe edasi...
(Ilmumisaeg: 14-Sep-2016, Hardback, Kirjastus: Springer-Verlag New York Inc., ISBN-13: 9781493964550)
This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer...Loe edasi...
Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Sari: Undergraduate Texts in Mathematics
(Ilmumisaeg: 10-Sep-2016, Paperback / softback, Kirjastus: Springer-Verlag New York Inc., ISBN-13: 9781493939381)
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for...Loe edasi...
This book describes the design, development, and testing of a novel digital watermarking technique for color images using Magic Square and Ridgelet transforms. The novel feature of the method is that it generates and uses multiple copies of the digit...Loe edasi...
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selecte...Loe edasi...