Free Delivery Over $100
10031 books were found.
Es behandelt nahezu alle kryptografischen Verfahren mit praktischer Relevanz. Es werden symmetrische Verfahren (DES,... Read More >>
This text integrates different mobility data handling processes, from database management to multi-dimensional analysis... Read More >>
This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment... Read More >>
Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to... Read More >>
Computational Intelligence techniques have been widely explored in various domains including forensics. Analysis... Read More >>
Read More >>
Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital... Read More >>
This O'Reilly report explains the capabilities of cloud-native platforms and examines the fundamental changes enterprises... Read More >>
Cyberspace is everywhere in today’s world and has significant implications not only for global economic activity,... Read More >>
The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based... Read More >>
The 4th International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR) is a research... Read More >>
"This book deals with one of the most novel advances in mathematical modeling for applied scientific technology,... Read More >>
In the second edition the authors added a complete description of the AES, an extended section on cryptographic... Read More >>
This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). Read More >>
This book features an in-depth overview of different topics concerning physical unclonable functions (PUFs), providing... Read More >>
This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges... Read More >>
This book provides the foundations for understanding hardware security and trust, which have become major concerns... Read More >>
This book addresses the fundamental concepts in the theory and practice of visual cryptography. reviews a range... Read More >>
"This book focuses on techniques that can be applied at the physical and data-link layers of communication systems... Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational... Read More >>