Muutke küpsiste eelistusi

E-raamat: Information Security Technologies in the Decentralized Distributed Networks

Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 135,23 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.

Methods for Privacy Support in the Decentralized Environment.- Application of Bluetooth, Wi-Fi and Gps Technologies in the means of Contact Tracking.- Analysis and Research of Threat, Attacker and Security Models of Data Depersonalization in Decentralized Networks.- Cryptographic Transformations in a Decentralized Blockchain Environment.- Statistical and Signature Analysis Methods of Intrusion Detection.- Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms.- Methods of Evaluation and Comparative Research of Cryptographic Conversions.- Cryptographic Mechanisms that Ensure the Efficiency of SNARK-Systems.- Comparative Analysis of Consensus Algorithms that use a Directed Acyclic Graph Instead of a Blockchain, and Construction of Estimates of the SPECTRE Protocol Security to the Double Spend Attack.- Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks.- The Methods of Data Comparison in Residue Numeral System.- Data Control in theSystem of Residual Classes.- Traffic Monitoring and Abnormality Detection Methods for Decentralized Distributed Networks.