This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identificatio...Loe edasi...
This primer introduces the elements that distinguish well-written computer code, covering style, clarity, technique, and robustness, to support readers in improving their coding skills. It explains why some approaches are better than others, and sho...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This volume gathers selected, peer-reviewed papers presented at the Sixth Scientific Days of the Doctoral School of Mathematics and Computer Sciences (S2DSMCS), held from December 1719, 2024, at Cheikh Anta Diop University in Dakar, Senegal. The wor...Loe edasi...
Industry 4.0 has greatly enhanced the intricacy and interconnectedness of industrial operations. Industrial Internet of Things (IIoT) systems allow for smooth communication and collaboration among machines, devices, and sensors, leaves IIoT networ...Loe edasi...
Mathematical Foundations of Blockchains is a two-volume work on blockchains. Blockchain is a novel paradigm for a distributed ledger. Volume 1 is on the fundamentals of blockchains and consists of an overview of blockchains, essential eleme...Loe edasi...
Mathematical Foundations of Blockchains is a two-volume work on blockchains. Blockchain is a novel paradigm for a distributed ledger. Volume 1 is on the fundamentals of blockchains and consists of an overview of blockchains, essential elements of bl...Loe edasi...
Explore the full scope of blockchain technology and its relationship with cybersecurity Cybersecurity Implications in Blockchain Architecture delves into the transformative power of blockchain technology and its intricate relation...Loe edasi...
This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable o...Loe edasi...
Can you crack these enjoyable word-and-number challenges? Test your vocabulary and logic with 300 Codeword puzzles arranged by difficulty: 100 easy, 100 medium, and 100 hard. Work your way up at your own pace, sharpening your gray matt...Loe edasi...
Internet of Medical Things (IoMT) is a system that collects data from patients with the help of different sensory inputs, e.g., accelerometer, electrocardiography, and electroencephalography....Loe edasi...
The Student Solutions Manual to Introduction to Modern Cryptography, Revised Third Edition, is available for the first time for the author. This contains solutions to all the even-numbered exercises in the book. ...Loe edasi...
Máire O'Neill, Francesco Regazzoni, Tim Güneysu, Adrian Waller
Sari: Information Security and Cryptography
(Ilmumisaeg: 13-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031599170)
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as...Loe edasi...
Learn the basics of blockchain technology in 25 concise steps. Featuring five additional steps, this updated version explores new developments within blockchain, such as...Loe edasi...
(Ilmumisaeg: 07-May-2026, Paperback / softback, Kirjastus: Times Books, ISBN-13: 9780008749170)
Challenge yourself with this collection of 300 compelling and addictive word and number puzzles from The Times. Appearing daily in the newspaper, Codeword is the cracking alternative to Su Doku and crosswords—offering logic, vocab...Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
Fire Brigades to Firewalls: A Public Safety Guide To Cybersecurity is written by John Kuforiji, a seasoned cybersecurity strategist, educator, and advocate. The book’s core message is that cybersecurity isnt scary—its learnable, visual, and even...Loe edasi...
Secure computation allows any number of mutually distrustful parties to jointly run anarbitrary computation on their combined inputs without compromising their privacy. Securecomputation offers a theoretical solution to a vast array of pro...Loe edasi...
This book presents a testable framework connecting quantum mechanics, neuroscience, cognitive science, and consciousness research to explore human performance and the nature of reality. Grounded in five empirical premises, it proposes that conscious...Loe edasi...
The connected nature of devices within the Internet of Things (IoT) has ushered in unprecedented opportunities, as well as formidable challenges in ensuring robust cybersecurity. This edited book presents research and insights into practice that e...Loe edasi...
The cybersecurity architect is not just a technician they are a tactician in the ever-present war in cyberspace. The Cybersecurity Architects Handbook, 2nd Edition takes you from foundational security principles through Zero Trust, AI security, cl...Loe edasi...
Cybersecurity for Healthcare Systems in the Internet of Medical Things Era is driven by the imperative to address the intricate convergence of healthcare, technology, and security. In response to the burgeoning challenges presented by the Inte...Loe edasi...
This book offers an extensive guide to classical and modern coding theory. Mainly addressed to graduate students, scientists and engineers, it m...Loe edasi...
Enrico Paolini, Gianluigi Liva, Balázs Matuz, Marco Chiani
(Ilmumisaeg: 09-Apr-2026, Hardback, Kirjastus: Cambridge University Press, ISBN-13: 9781107131552)
A unique resource for analyzing, designing and implementing erasure codes for future computer networks, with an accessible treatment of the theoretical basis as well as practical methods and applications. This self-contained reference is invaluable...Loe edasi...
This handbook offers a examination of the changing landscape of cybersecurity, exploring the challenges and solutions that shape the field. It features in-depth chapters written by experts in cybersecurity, providing a detailed evaluation of the t...Loe edasi...
This book delves into the fundamentals of steganography, the ancient art of hiding messages in plain sight. From the historical roots to modern applications, readers are taken on a journey through the techniques that transform seemingly ordinary c...Loe edasi...
This book delves into the fundamentals of steganography, the ancient art of hiding messages in plain sight. From the historical roots to modern applications, readers are taken on a journey through the techniques that transform seemingly ordinary c...Loe edasi...