![]() |
Responsible Graph Neural Networks
ISBN: 9781032359885 / Angielski / Miękka / 330 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-security specialists. This book offers a complete study in the area of graph learning in cyber, emphasizing graph neural networks (GNNs) and their cyber-security applications.
Three parts examine the basics, methods and practices, and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber-security applications. The second part explains three different categories of graph learning, including deterministic,... More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-security specialists. This book offers a complete st...
|
cena:
239,94 |
![]() |
Responsible Graph Neural Networks
ISBN: 9781032359892 / Angielski / Twarda / 330 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-security specialists. This book offers a complete study in the area of graph learning in cyber, emphasizing graph neural networks (GNNs) and their cyber-security applications.
Three parts examine the basics, methods and practices, and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber-security applications. The second part explains three different categories of graph learning, including deterministic,... More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-security specialists. This book offers a complete st...
|
cena:
426,05 |
![]() |
Blockchain, Artificial Intelligence, and the Internet of Things: Possibilities and Opportunities
ISBN: 9783030776398 / Angielski / Miękka / 213 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with...
This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. T...
|
cena:
221,37 |
![]() |
Information Security and Privacy: 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022, Proceedings
ISBN: 9783031223006 / Angielski / Miękka / 530 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongon...
|
cena:
362,27 |
![]() |
Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II
ISBN: 9783031223648 / Angielski / Miękka / 811 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption;...
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryp...
|
cena:
684,33 |
![]() |
Triangle Mesh Watermarking and Steganography
ISBN: 9789811977190 / Angielski / Twarda / 188 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications...
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The ...
|
cena:
684,33 |
![]() |
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World
ISBN: 9780367532963 / Angielski / Miękka / 314 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions.
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which...
|
cena:
216,48 |
![]() |
Cyber Operations: A Case Study Approach
ISBN: 9781119712091 / Angielski / Twarda / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
507,82 |
![]() |
Math for Security: From Graphs and Geometry to Spatial Analysis
ISBN: 9781718502567 / Angielski / Miękka / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Applied Math for Security is one of the first math-based guides specifically geared for information security practitioners. Readers will learn how to use concepts from various fields of mathematics - like graph theory, computational geometry, and statistics - to create and implement ready-to-use security tools. The book is written in a lively, conversational style that engages readers from the get-go. Chapters are enriched with code examples written in Python, and feature hands-on 'proof of concept' projects that involve developing math-based applications to solve real-world problems....
Applied Math for Security is one of the first math-based guides specifically geared for information security practitioners. Readers will learn how to...
|
cena:
241,50 |
![]() |
Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings
ISBN: 9783031228285 / Angielski / Miękka / 343 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9–12, 2022.The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE ...
|
cena:
301,89 |
![]() |
Progress in Cryptology - Indocrypt 2022: 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings
ISBN: 9783031229114 / Angielski / Miękka / 722 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11–14, 2022. The conference took place in Kolkata, India.The 31 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: symmetric key cryptology;protocols and implementation;cryptanalysis;boolean functions;quantum cryptography and cryptanalysis;post quantum cryptography
The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11–14, 202...
|
cena:
442,79 |
![]() |
Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part I
ISBN: 9783031229626 / Angielski / Miękka / 811 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows:Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and...
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Appl...
|
cena:
483,04 |
![]() |
Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part II
ISBN: 9783031229657 / Angielski / Miękka / 695 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows:Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and...
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Appl...
|
cena:
402,53 |
![]() |
Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part III
ISBN: 9783031229688 / Angielski / Miękka / 788 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows:Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and...
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Appl...
|
cena:
442,79 |
![]() |
Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings
ISBN: 9783031230196 / Angielski / Miękka / 747 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022.The 23 full and 18 short papers presented in this book were carefully reviewed and selected from 83 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, ...
|
cena:
442,79 |
![]() |
Trusted Computing Platforms: Design and Applications
ISBN: 9787302131748 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
425,33 |
![]() |
Kryptografie fur Dummies 2e
ISBN: 9783527720934 / Niemiecki / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
111,83 |
![]() |
Attribute-based Encryption (ABE): Foundations and Applications within Blockchain and Cloud Environments
ISBN: 9781119989356 / Angielski / Twarda / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
489,51 |
![]() |
Combinatorics and Number Theory of Counting Sequences
ISBN: 9781032475356 / Angielski / Miękka / 498 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Combinatorialists are seldom aware of number theoretical tools, and number theorists rarely aware of possible combinatorial applications. This book is accessible for both of the groups. The first part introduces important counting sequences. The second part shows how these sequences can be generalized to study new combinatorial problems
Combinatorialists are seldom aware of number theoretical tools, and number theorists rarely aware of possible combinatorial applications. This book is...
|
cena:
237,10 |
![]() |
Cryptology: Classical and Modern
ISBN: 9781032475929 / Angielski / Miękka / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the...
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical met...
|
cena:
230,14 |