This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identificatio...Loe edasi...
Industry 4.0 has greatly enhanced the intricacy and interconnectedness of industrial operations. Industrial Internet of Things (IIoT) systems allow for smooth communication and collaboration among machines, devices, and sensors, leaves IIoT networ...Loe edasi...
This volume gathers selected, peer-reviewed papers presented at the Sixth Scientific Days of the Doctoral School of Mathematics and Computer Sciences (S2DSMCS), held from December 1719, 2024, at Cheikh Anta Diop University in Dakar, Senegal. The wor...Loe edasi...
This book provides a comprehensive guide to integrating Artificial Intelligence (AI), Large Language Models (LLMs), and quantum-safe security mechanisms into modern cybersecurity practices. It begins by examining the evolving cyber threat landscape...Loe edasi...
Explore the full scope of blockchain technology and its relationship with cybersecurity Cybersecurity Implications in Blockchain Architecture delves into the transformative power of blockchain technology and its intricate relation...Loe edasi...
This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable o...Loe edasi...
Can you crack these enjoyable word-and-number challenges? Test your vocabulary and logic with 300 Codeword puzzles arranged by difficulty: 100 easy, 100 medium, and 100 hard. Work your way up at your own pace, sharpening your gray matt...Loe edasi...
Internet of Medical Things (IoMT) is a system that collects data from patients with the help of different sensory inputs, e.g., accelerometer, electrocardiography, and electroencephalography....Loe edasi...
(Ilmumisaeg: 29-Jun-2026, Paperback / softback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789819800773)
This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoretical foundations and the practical aspects, including labs. It does not require prior knowledge in mathematics, cryptography or th...Loe edasi...
(Ilmumisaeg: 29-Jun-2026, Hardback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789811299100)
This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoretical foundations and the practical aspects, including labs. It does not require prior knowledge in mathematics, cryptography or th...Loe edasi...
The Student Solutions Manual to Introduction to Modern Cryptography, Revised Third Edition, is available for the first time for the author. This contains solutions to all the even-numbered exercises in the book. ...Loe edasi...
Máire O'Neill, Francesco Regazzoni, Tim Güneysu, Adrian Waller
Sari: Information Security and Cryptography
(Ilmumisaeg: 13-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031599170)
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as...Loe edasi...
Learn the basics of blockchain technology in 25 concise steps. Featuring five additional steps, this updated version explores new developments within blockchain, such as...Loe edasi...
(Ilmumisaeg: 07-May-2026, Paperback / softback, Kirjastus: Times Books, ISBN-13: 9780008749170)
Challenge yourself with this collection of 300 compelling and addictive word and number puzzles from The Times. Appearing daily in the newspaper, Codeword is the cracking alternative to Su Doku and crosswords—offering logic, vocab...Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
Secure computation allows any number of mutually distrustful parties to jointly run anarbitrary computation on their combined inputs without compromising their privacy. Securecomputation offers a theoretical solution to a vast array of pro...Loe edasi...
This book presents a testable framework connecting quantum mechanics, neuroscience, cognitive science, and consciousness research to explore human performance and the nature of reality. Grounded in five empirical premises, it proposes that conscious...Loe edasi...
This proceedings volume is a collection of 35 chapters presented at the Second International Conference on Artificial Intelligence, Machine Learning and Intelligent Systems (ICAMS-2025), held at the National Institute of Technology Hamirpur, Himac...Loe edasi...
The connected nature of devices within the Internet of Things (IoT) has ushered in unprecedented opportunities, as well as formidable challenges in ensuring robust cybersecurity. This edited book presents research and insights into practice that e...Loe edasi...