![]() |
Cyber Security: The complete guide to cyber threats and protection
ISBN: 9781780175959 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
176,49 |
![]() |
Digital Forensics and Watermarking: 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers
ISBN: 9783031251146 / Angielski / Miękka / 219 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022.The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking.
This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022.The 1...
|
cena:
262,25 |
![]() |
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers
ISBN: 9783031257339 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26–30, 2022.For DPM 2022, 10 full papers out of 21 submissions have been accepted for inclusion in this book. They were organized in topical sections as follows: differential privacy and data analysis; regulation, artificial intelligence, and formal verification; and leakage quantification and applications.The CBT 2022...
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, C...
|
cena:
302,60 |
![]() |
AI-Based Metaheuristics for Information Security and Digital Media
ISBN: 9780367615420 / Angielski / Twarda / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book examines the latest developments in AI-based metaheuristics algorithms with applications in information security for digital media. It highlights the importance of several security parameters, their analysis, and validations for different practical applications.
This book examines the latest developments in AI-based metaheuristics algorithms with applications in information security for digital media. It highl...
|
cena:
436,25 |
![]() |
A-Z Password Book: Individual Letter Tabs to Quickly Access Login Information
ISBN: 9780593435823 / Angielski / Miękka / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
45,36 |
![]() |
The Vulnerability Researcher\'s Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
ISBN: 9781803238876 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receiving credit for your work Key Features Build successful strategies for planning and executing zero-day vulnerability research Find the best ways to disclose vulnerabilities while avoiding vendor conflict Learn to navigate the complicated CVE publishing process to receive credit for your research Book DescriptionVulnerability researchers are in increasingly high demand as the number of security incidents related to crime continues to rise with...
Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receivin...
|
cena:
157,47 |
![]() |
An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection
ISBN: 9783031281600 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols.This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for...
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols.This survey...
|
cena:
181,55 |
![]() |
Innovations in Digital Forensics
ISBN: 9789811273193 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the investigation of cybercrimes. With the growing deployment of cloud computing, mobile computing, and digital banking on the internet, the nature of digital forensics has evolved in recent years, and will continue to do so in the near future.This book presents state-of-the-art techniques to address imminent challenges in digital forensics. In particular, it focuses on cloud forensics, Internet-of-Things (IoT) forensics, and network forensics, elaborating on innovative techniques, including algorithms, implementation details and performance analysis, to...
Digital forensics deals with the investigation of cybercrimes. With the growing deployment of cloud computing, mobile computing, and digital banking o...
|
cena:
605,99 |
![]() |
Basics on Public Key Infrastructure (PKI)
ISBN: 9798215252864 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
63,82 |
![]() |
Blockchain Beginners: Smart Contracts: A Simple Overview and Guide To Smart Contracts
ISBN: 9798375234717 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
39,87 |
![]() |
Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis
ISBN: 9781032407463 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and transfers the latest knowledge in machine learning and deep learning models towards this end.
This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handli...
|
cena:
630,22 |
![]() |
Concise Encyclopedia of Coding Theory
ISBN: 9780367709327 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Coding theory has grown into a discipline with many practical applications requiring various mathematical techniques in the last few decades. Most topics covered in this book are presented in short sections at an introductory level and progress from basic to advanced level, with definitions, examples, and many references.
Coding theory has grown into a discipline with many practical applications requiring various mathematical techniques in the last few decades. Most top...
|
cena:
421,71 |
![]() |
CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance
ISBN: 9781839381843 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
170,25 |
![]() |
Applications of Encryption and Watermarking for Information Security
ISBN: 9781668449455 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. Therefore, in the fields of information security, data encryption, and watermarking, there exists a need for a collection of original research in this area. Applications of Encryption and Watermarking for Information Security provides relevant theoretical frameworks and the latest empirical research findings...
In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expa...
|
cena:
1213,28 |
![]() |
Applications of Encryption and Watermarking for Information Security
ISBN: 9781668449462 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. Therefore, in the fields of information security, data encryption, and watermarking, there exists a need for a collection of original research in this area. Applications of Encryption and Watermarking for Information Security provides relevant theoretical frameworks and the latest empirical research findings...
In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expa...
|
cena:
909,96 |
![]() |
Information Security and Cryptology – ICISC 2022: 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022, Revised Selected Papers
ISBN: 9783031293702 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30–December 2, 2022.The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: Public Key Encryption with Hierarchical Authorized Keyword Search, Implicit Key-stretching Security of Encryption Schemes.
This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30–Dece...
|
cena:
363,12 |
![]() |
Practical Guide on Security and Privacy in Cyber-Physical Systems, A: Foundations, Applications and Limitations
ISBN: 9789811273544 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Practical Guide on Security and Privacy in Cyber-Physical Systems offers an in-depth look at the recent security and privacy challenges of Cyber-Physical Systems (CPS) in multiple application domains. It provides readers with a comprehensive view of system architecture for cybersecurity systems before actual implementation.The book first presents a systematic overview on several CPS applications covering standard architectures before zooming into each of the layers of the architectureal design to describe the underpinning technological, security, and privacy issues currently facing some CPS...
A Practical Guide on Security and Privacy in Cyber-Physical Systems offers an in-depth look at the recent security and privacy challenges of Cyber-Phy...
|
cena:
436,31 |
![]() |
Encryption Demystified The Key to Securing Your Digital Life
ISBN: 9798215356623 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
95,78 |
![]() |
Mastering Blockchain - Fourth Edition: A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs
ISBN: 9781803241067 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Demystify one of the most disruptive modern technologies and gain an understanding of distributed ledger technology, consensus protocols, smart contracts, DApps, blockchain scalability, privacy, security, and more. Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features Study new blockchains, including Polkadot, Solana, and dive into the architecture of Ethereum's execution and consensus layer Explore distributed ledger technologies such as Ethereum, Bitcoin, Hyperledger Fabric, and Quorum Get to grips with Solidity, Web3, NFTs, DeFi, and smart contract...
Demystify one of the most disruptive modern technologies and gain an understanding of distributed ledger technology, consensus protocols, smart contra...
|
cena:
212,81 |
![]() |
Privacy and Identity Management. Between Data Protection and Security: 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16–20, 2
ISBN: 9783030991029 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August 2021.The 9 full papers included in this volume were carefully reviewed and selected from 23 submissions. Also included are 2 invited keynote papers and 3 tutorial/workshop summary papers. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a...
This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Man...
|
cena:
363,12 |