This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identificatio...Loe edasi...
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats....Loe edasi...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Loe edasi...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of know...Loe edasi...
Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin act...Loe edasi...
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity, both new opportunities and hazards are emerging. Cryptocurrencies are no longer a fringe idea; they are now a component of i...Loe edasi...
The text covers the fundamentals of Python programming and the implementation of data structures using Python programming with the help of worked-out examples. It provides a learning tool for engineers as well as for researchers and scientists of ad...Loe edasi...
This text presents innovative research-oriented ideas, and the implementation and socio-economic applications of internet of things-based network. It showcases smart waste management, optical technologies for internet of things, and remote patient m...Loe edasi...
Albrecht Beutelspacher, Jörg Schwenk, Klaus-Dieter Wolfenstetter
Sari: Mathematics Study Resources
(Ilmumisaeg: 21-Jun-2026, Paperback / softback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662674420)
Die Entwicklung und Analyse von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Große Berühmtheit erlangt haben die so genannten Zero-Knowledge-Protokolle, mit denen es gelingt, einen anderen von der Existenz eines Geheimnis...Loe edasi...
Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin act...Loe edasi...
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity, both new opportunities and hazards are emerging. Cryptocurrencies are no longer a fringe idea; they are now a component of i...Loe edasi...
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and comp...Loe edasi...
This proceedings volume is a collection of 35 chapters presented at the Second International Conference on Artificial Intelligence, Machine Learning and Intelligent Systems (ICAMS-2025), held at the National Institute of Technology Hamirpur, Himac...Loe edasi...
This monograph will serve as a reference for mathematicians working in the spectral theory of signed graphs as well as a tutorial for graduate students entering the subject area and computer scientists, chemists, physicists, biologists, electrical e...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This primer introduces the elements that distinguish well-written computer code, covering style, clarity, technique, and robustness, to support readers in improving their coding skills. It explains why some approaches are better than others, and sho...Loe edasi...
Learn the basics of blockchain technology in 25 concise steps. Featuring five additional steps, this updated version explores new developments within blockchain, such as...Loe edasi...
Industry 4.0 has greatly enhanced the intricacy and interconnectedness of industrial operations. Industrial Internet of Things (IIoT) systems allow for smooth communication and collaboration among machines, devices, and sensors, leaves IIoT networ...Loe edasi...
Mathematical Foundations of Blockchains is a two-volume work on blockchains. Blockchain is a novel paradigm for a distributed ledger. Volume 1 is on the fundamentals of blockchains and consists of an overview of blockchains, essential eleme...Loe edasi...
Mathematical Foundations of Blockchains is a two-volume work on blockchains. Blockchain is a novel paradigm for a distributed ledger. Volume 1 is on the fundamentals of blockchains and consists of an overview of blockchains, essential elements of bl...Loe edasi...
Explore the full scope of blockchain technology and its relationship with cybersecurity Cybersecurity Implications in Blockchain Architecture delves into the transformative power of blockchain technology and its intricate relation...Loe edasi...
This volume gathers selected, peer-reviewed papers presented at the Sixth Scientific Days of the Doctoral School of Mathematics and Computer Sciences (S2DSMCS), held from December 1719, 2024, at Cheikh Anta Diop University in Dakar, Senegal. The wor...Loe edasi...
This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable o...Loe edasi...
Can you crack these enjoyable word-and-number challenges? Test your vocabulary and logic with 300 Codeword puzzles arranged by difficulty: 100 easy, 100 medium, and 100 hard. Work your way up at your own pace, sharpening your gray matt...Loe edasi...
Internet of Medical Things (IoMT) is a system that collects data from patients with the help of different sensory inputs, e.g., accelerometer, electrocardiography, and electroencephalography....Loe edasi...
The Student Solutions Manual to Introduction to Modern Cryptography, Revised Third Edition, is available for the first time for the author. This contains solutions to all the even-numbered exercises in the book. ...Loe edasi...
Máire O'Neill, Francesco Regazzoni, Tim Güneysu, Adrian Waller
Sari: Information Security and Cryptography
(Ilmumisaeg: 13-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031599170)
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as...Loe edasi...
(Ilmumisaeg: 07-May-2026, Paperback / softback, Kirjastus: Times Books, ISBN-13: 9780008749170)
Challenge yourself with this collection of 300 compelling and addictive word and number puzzles from The Times. Appearing daily in the newspaper, Codeword is the cracking alternative to Su Doku and crosswords—offering logic, vocab...Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats....Loe edasi...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Loe edasi...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of know...Loe edasi...
Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin act...Loe edasi...
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity, both new opportunities and hazards are emerging. Cryptocurrencies are no longer a fringe idea; they are now a component of i...Loe edasi...
The text covers the fundamentals of Python programming and the implementation of data structures using Python programming with the help of worked-out examples. It provides a learning tool for engineers as well as for researchers and scientists of ad...Loe edasi...
This text presents innovative research-oriented ideas, and the implementation and socio-economic applications of internet of things-based network. It showcases smart waste management, optical technologies for internet of things, and remote patient m...Loe edasi...
Albrecht Beutelspacher, Jörg Schwenk, Klaus-Dieter Wolfenstetter
Sari: Mathematics Study Resources
(Ilmumisaeg: 21-Jun-2026, Paperback / softback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662674420)
Die Entwicklung und Analyse von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Große Berühmtheit erlangt haben die so genannten Zero-Knowledge-Protokolle, mit denen es gelingt, einen anderen von der Existenz eines Geheimnis...Loe edasi...
Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin act...Loe edasi...
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity, both new opportunities and hazards are emerging. Cryptocurrencies are no longer a fringe idea; they are now a component of i...Loe edasi...
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and comp...Loe edasi...
Readers of all backgrounds will learn about cryptographys role in protecting everyday digital interactions – from buying a coffee to texting a friend – from two security experts.This cybersecurity book for beginners and experts alike...Loe edasi...
This proceedings volume is a collection of 35 chapters presented at the Second International Conference on Artificial Intelligence, Machine Learning and Intelligent Systems (ICAMS-2025), held at the National Institute of Technology Hamirpur, Himac...Loe edasi...
This monograph will serve as a reference for mathematicians working in the spectral theory of signed graphs as well as a tutorial for graduate students entering the subject area and computer scientists, chemists, physicists, biologists, electrical e...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This primer introduces the elements that distinguish well-written computer code, covering style, clarity, technique, and robustness, to support readers in improving their coding skills. It explains why some approaches are better than others, and sho...Loe edasi...
Learn the basics of blockchain technology in 25 concise steps. Featuring five additional steps, this updated version explores new developments within blockchain, such as...Loe edasi...
Industry 4.0 has greatly enhanced the intricacy and interconnectedness of industrial operations. Industrial Internet of Things (IIoT) systems allow for smooth communication and collaboration among machines, devices, and sensors, leaves IIoT networ...Loe edasi...
Mathematical Foundations of Blockchains is a two-volume work on blockchains. Blockchain is a novel paradigm for a distributed ledger. Volume 1 is on the fundamentals of blockchains and consists of an overview of blockchains, essential eleme...Loe edasi...