Albrecht Beutelspacher, Jörg Schwenk, Klaus-Dieter Wolfenstetter
Sari: Mathematics Study Resources
(Ilmumisaeg: 21-Jun-2026, Paperback / softback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662674420)
Die Entwicklung und Analyse von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Große Berühmtheit erlangt haben die so genannten Zero-Knowledge-Protokolle, mit denen es gelingt, einen anderen von der Existenz eines Geheimnis...Loe edasi...
This book aims to present in much detail how complex adaptive processes in cybersecurity can be analysed based on multiple levels of adaptation and control in a multilevel adaptive dynamical system architecture. Furthermore, it is shown how such com...Loe edasi...
Whether youre a student stepping into the world of cybersecurity or a self-taught learner eager to build real-world skills, this book is your gateway to understanding and mastering Linux from both offensive and defensive perspectives. Designed for...Loe edasi...
Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin act...Loe edasi...
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity, both new opportunities and hazards are emerging. Cryptocurrencies are no longer a fringe idea; they are now a component of i...Loe edasi...
This book explores deep learning as a next-generation approach to online payment fraud detection in the face of increasingly complex and adaptive threats. Traditional rule-based or shallow learning methods are no longer sufficient. Through ten focus...Loe edasi...
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and comp...Loe edasi...
This book demonstrates how quantitative resilience methodologies can be applied to a wide range of space systems as an extension of conventional systems engineering processes. It addresses the full spectrum of threats facing modern space systems a...Loe edasi...
This book takes the complex and highly topical theme of AI-driven surveillance and reduces it to simple but important questions. Drawing upon the authors professional experience as UKs first joint Biometrics and Surveillance Camera Commissioner, the...Loe edasi...
This book integrates innovative theoretical research with practical application, providing a comprehensive and in-depth guide for practitioners, researchers in the field of intelligent manufacturing, and readers from all walks of life who are curiou...Loe edasi...
This book presents advanced Dynamic State Estimation (DSE) methodologies across three power system classes: quasi-steady power systems, synchronous-generator-based multi-machine systems and renewable energy microgrids including unconventional measur...Loe edasi...
The book Safety Strategy for Intelligent Transport Telematics Systems is a monograph devoted to one of the key challenges of modern transport - the security of telematics systems. In this sense, the publication aligns with current research trend...Loe edasi...
Generative AI for Cybersecurity explores how rapidly evolving generative models are reshaping modern digital defense. As organizations become more interconnected and data-driven, traditional cybersecurity measures are increasingly challenged by ad...Loe edasi...
This proceedings volume is a collection of 35 chapters presented at the Second International Conference on Artificial Intelligence, Machine Learning and Intelligent Systems (ICAMS-2025), held at the National Institute of Technology Hamirpur, Himac...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
In todays data-driven world, securing sensitive information while enabling collaboration is crucial for every organization. This book empowers you to unlock the full potential of Salesforces sharing and visibility architecture, balancing access and...Loe edasi...
In the age of continuous delivery and microservices, the difference between resilient software and production chaos lies in proactive fault detection. This book shows how to harness the power of predictive analytics and DevSecOps to find weaknesses...Loe edasi...
Blockchain Sharding: Theory and Practice provides a comprehensive exploration of one of the most promising scalability solutions for blockchain systems. This book bridges the gap between foundational theories and real-world implementations, offering...Loe edasi...
This book explores sharenting—the widespread practice of parents or caregivers sharing information about their children online—and explores how this pervasive digital practice is reshaping childhood, parenting, and family life in a networke...Loe edasi...
In a digital world saturated with synthetic media and AI-shaped narratives, the quest for trustworthy public information has never been more urgent. Governing Public Information in the Age of AI explores how blockchain can strengthen the integrity o...Loe edasi...
This book discusses how artificial intelligence, machine learning, and digital technology are being used to re-engineer the manufacturing industry. With a particular emphasis on small- and medium-sized enterprises (SMEs), this book debunks the myth...Loe edasi...
This book outlines a practical framework for implementing a resilient circular economy principle across ten major industries in a developed country. It focuses on integrating circular thinking into supply chain management and applying digital transf...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
The book explores how universities can harness the power of artificial intelligence (AI) while safeguarding privacy, equity, and academic values. Focusing on China’s rapidly evolving higher education sector, this book examines the op...Loe edasi...
Quantum informatics for novel therapeutics is a field-guide to the new healthcare stackwhere quantum computing, AI, cybersecurity, and biomedical data science converge to change what we can discover, protect, and deliver. It takes readers from the e...Loe edasi...
This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
AI-Powered Cybersecurity Essentials: Protecting Enterprise Networks explores how modern AI and machine learning safeguard complex, hybrid enterprise environments. The book progresses from cybersecurity and ML foundations to applied defenses: AI-enha...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security. In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental improve...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security.In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental i...Loe edasi...
Albrecht Beutelspacher, Jörg Schwenk, Klaus-Dieter Wolfenstetter
Sari: Mathematics Study Resources
(Ilmumisaeg: 21-Jun-2026, Paperback / softback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662674420)
Die Entwicklung und Analyse von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Große Berühmtheit erlangt haben die so genannten Zero-Knowledge-Protokolle, mit denen es gelingt, einen anderen von der Existenz eines Geheimnis...Loe edasi...
This book aims to present in much detail how complex adaptive processes in cybersecurity can be analysed based on multiple levels of adaptation and control in a multilevel adaptive dynamical system architecture. Furthermore, it is shown how such com...Loe edasi...
Whether youre a student stepping into the world of cybersecurity or a self-taught learner eager to build real-world skills, this book is your gateway to understanding and mastering Linux from both offensive and defensive perspectives. Designed for...Loe edasi...
Cryptocurrency Forensics and Investigation Using Open Source Tools and Techniques is a two-volume series that was written for such reason. It is intended to be a useful, hands-on resource for people who wish to learn about and research bitcoin act...Loe edasi...
The financial industry has been evolving more quickly than most of us anticipated. As digital currencies gain popularity, both new opportunities and hazards are emerging. Cryptocurrencies are no longer a fringe idea; they are now a component of i...Loe edasi...
This book explores deep learning as a next-generation approach to online payment fraud detection in the face of increasingly complex and adaptive threats. Traditional rule-based or shallow learning methods are no longer sufficient. Through ten focus...Loe edasi...
Data is becoming increasingly important, and so is data security. This book is aimed at anyone interested in high data security in telecommunications and data storage, especially IT security experts, procurers, decision-makers, consultants, and comp...Loe edasi...
This book demonstrates how quantitative resilience methodologies can be applied to a wide range of space systems as an extension of conventional systems engineering processes. It addresses the full spectrum of threats facing modern space systems a...Loe edasi...
Readers of all backgrounds will learn about cryptographys role in protecting everyday digital interactions – from buying a coffee to texting a friend – from two security experts.This cybersecurity book for beginners and experts alike...Loe edasi...
This book takes the complex and highly topical theme of AI-driven surveillance and reduces it to simple but important questions. Drawing upon the authors professional experience as UKs first joint Biometrics and Surveillance Camera Commissioner, the...Loe edasi...
This book integrates innovative theoretical research with practical application, providing a comprehensive and in-depth guide for practitioners, researchers in the field of intelligent manufacturing, and readers from all walks of life who are curiou...Loe edasi...
This book presents advanced Dynamic State Estimation (DSE) methodologies across three power system classes: quasi-steady power systems, synchronous-generator-based multi-machine systems and renewable energy microgrids including unconventional measur...Loe edasi...
The book Safety Strategy for Intelligent Transport Telematics Systems is a monograph devoted to one of the key challenges of modern transport - the security of telematics systems. In this sense, the publication aligns with current research trend...Loe edasi...
Generative AI for Cybersecurity explores how rapidly evolving generative models are reshaping modern digital defense. As organizations become more interconnected and data-driven, traditional cybersecurity measures are increasingly challenged by ad...Loe edasi...
This proceedings volume is a collection of 35 chapters presented at the Second International Conference on Artificial Intelligence, Machine Learning and Intelligent Systems (ICAMS-2025), held at the National Institute of Technology Hamirpur, Himac...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
In todays data-driven world, securing sensitive information while enabling collaboration is crucial for every organization. This book empowers you to unlock the full potential of Salesforces sharing and visibility architecture, balancing access and...Loe edasi...
In the age of continuous delivery and microservices, the difference between resilient software and production chaos lies in proactive fault detection. This book shows how to harness the power of predictive analytics and DevSecOps to find weaknesses...Loe edasi...
Blockchain Sharding: Theory and Practice provides a comprehensive exploration of one of the most promising scalability solutions for blockchain systems. This book bridges the gap between foundational theories and real-world implementations, offering...Loe edasi...
This book explores sharenting—the widespread practice of parents or caregivers sharing information about their children online—and explores how this pervasive digital practice is reshaping childhood, parenting, and family life in a networke...Loe edasi...
In a digital world saturated with synthetic media and AI-shaped narratives, the quest for trustworthy public information has never been more urgent. Governing Public Information in the Age of AI explores how blockchain can strengthen the integrity o...Loe edasi...
This book discusses how artificial intelligence, machine learning, and digital technology are being used to re-engineer the manufacturing industry. With a particular emphasis on small- and medium-sized enterprises (SMEs), this book debunks the myth...Loe edasi...
This book outlines a practical framework for implementing a resilient circular economy principle across ten major industries in a developed country. It focuses on integrating circular thinking into supply chain management and applying digital transf...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
The book explores how universities can harness the power of artificial intelligence (AI) while safeguarding privacy, equity, and academic values. Focusing on China’s rapidly evolving higher education sector, this book examines the op...Loe edasi...
Quantum informatics for novel therapeutics is a field-guide to the new healthcare stackwhere quantum computing, AI, cybersecurity, and biomedical data science converge to change what we can discover, protect, and deliver. It takes readers from the e...Loe edasi...
This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
AI-Powered Cybersecurity Essentials: Protecting Enterprise Networks explores how modern AI and machine learning safeguard complex, hybrid enterprise environments. The book progresses from cybersecurity and ML foundations to applied defenses: AI-enha...Loe edasi...
Secure identities across clouds and streamline DevOps workflows with real-world IAM strategies Key Features Master IAM across Azure, AWS, and GCP with platform-specific tools and best practices Secure CI/CD pipelines by automat...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security. In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental improve...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security.In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental i...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
The digital forensics research community develops new solutions daily to advance its subfields, including cloud and network forensics and security. However, a substantial amount of such research requires greater experimental rigor. A few works have...Loe edasi...
Disinformation has become one of the most dangerous threats to modern businesses. In this book, communications expert Uwe Wolff reveals how false narratives, digital smear campaigns, deepfakes, bots and state-sponsored influence operations are used...Loe edasi...
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of technological growth, over implementing privacy and data protection measures in the last three decades. It showcases the expectati...Loe edasi...
The book explores the intricate nexus between biometric systems and the need for preserving data integrity as well as security needed during the data communication. It offers a systematic and insightful journey through the multifaceted landscape o...Loe edasi...
The use of intelligent technologies to enhance instruction and learning is introduced in pedagogy-based learning-teaching perspective. It covers digital library resources, AI-based tools, data analysis techniques, and NLP and NLU-powered smart ass...Loe edasi...
The objective of this publication AI Modernisation Techniques for Contemporary Trends is to offer a comprehensive and practical framework for engineers, technicians, and individuals interested in converting conventional electromechanical sy...Loe edasi...
The Basics of Digital Forensics, Third Edition provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key t...Loe edasi...
School Security: How to Build and Strengthen a School Safety Program, Third Edition emphasizes a proactive rather than reactive approach to school security. Through a holistic approach, rather than focusing on a particular threat or event, readers a...Loe edasi...
(Ilmumisaeg: 01-Jun-2026, Hardback, Kirjastus: Institution of Engineering and Technology, ISBN-13: 9781807050672)
This book presents information on hardware trojan attacks and their countermeasures, using high level synthesis. It includes an introduction to hardware trojans, various attack strategies, as well as trojan detection and its countermeasures....Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
The SAS ecosystem is evolving. Whether you work with SAS Viya or SAS 9, theres never been a better time to dive in and master its full potential. This book guid...Loe edasi...
This book provides a structured, practical exploration of modern computer networking concepts and the transformative role of artificial intelligence in cybersecurity. This book begins by introducing the foundational principles of computer networks,...Loe edasi...
Learn the basics of blockchain technology in 25 concise steps. Featuring five additional steps, this updated version explores new developments within blockchain, such as...Loe edasi...
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. This book confronts that gap with a practice-oriented guide to designing, analysing, and governing safer digital ecosystems....Loe edasi...
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse and mistrust. This book confronts that gap with a practice-oriented guide to designing, analysing and governing safer digital ecosystems....Loe edasi...