This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The targ......more
Embark on a journey into the intersection of the metaverse and blockchain with Metaverse and Blockchain Use Cases and Ap......more
In this book, the most important cryptographic algorithms, protocols and constructions of the last decades are explained......more
This book covers state-of-the-art topics in the multidisciplinary areas of Artificial Intelligence (AI) and advanced con......more
This surprisingly accessible book uses key math concepts and more than 500 short exercises to teach functional programmi......more
Understand the future of a thriving research toolkit with this introduction to big data analytics In recent decades, big......more
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of tech......more
...more
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from ......more
This textbook is a product of the author s experience teaching software engineering courses and directing student softwa......more
This book examines the safety and security of event planning, from small and mid-sized events to large scale events requ......more
...more
This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoreti......more
This book is a comprehensive introduction to applied cryptography and cybersecurity, covering both the critical theoreti......more
A comprehensive introduction to the fundamentals of provable security for advanced undergraduates. This accessible textb......more
This unique compendium is based on the author’s teaching and research experiences. It covers the fundamental principles ......more
This textbook introduces the fundamental concepts and techniques used in biometric recognition to students, practitioner......more
...more
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolvin......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
Blockchain is being touted as the next Internet revolution akin to the worldwide web and e-commerce. This unique compend......more
As cloud technology becomes increasingly essential across industries, the need for thorough security knowledge and certi......more
...more
Think like a hacker to protect your sensitive information To safeguard your private data from prying eyes, it helps to u......more
The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, pos......more
This book explores addressing the growing need for insights and practical experiences in this evolving field of cybersec......more
...more
...more
...more
This book focuses on the design methodologies of various quantum circuits, DNA circuits, DNA-quantum circuits and quantu......more
...more
...more
...more
...more
...more
...more
This book is a timely and systematic analysis of Russian hybrid warfare with a particular focus on Russian cyberespionag......more
...more
Data Analytics using Machine Learning Techniques on Cloud Platforms examines how machine learning and cloud computing co......more
...more
...more
...more
Learn to program tomorrow’s technology with this accessible exploration of quantum computing, requiring only high school......more
...more
This book explores the critical intersection of human behaviour, cybersecurity, and the transformative potential of quan......more
This book explores the critical intersection of human behaviour, cybersecurity, and the transformative potential of quan......more
The book examines the integration of IoT, Blockchain, and Smart Healthcare, providing a comprehensive analysis of these ......more
Digital Strategy and Governance in Transformative Technologies offers a comprehensive exploration of how emerging techno......more
Digital Strategy and Governance in Transformative Technologies offers a comprehensive exploration of how emerging techno......more
...more
...more
This book introduces quantum computing and quantum communications at the undergraduate level for students in the physica......more
This book introduces quantum computing and quantum communications at the undergraduate level for students in the physica......more
The Certified Ethical Hacker (CEH) exam is not an enjoyable undertaking. This grueling, exhaustive, challenging, and tax......more
The internet wasn’t built for time travelers. But when ethical hacker and mother Elsa and her 14-year-old son, Aiden, un......more
This book mainly focuses on the design methodologies of various quantum circuits, DNA circuits, DNA-quantum circuits, an......more
The internet wasn’t built for time travelers. But when ethical hacker and mother Elsa and her 14-year-old son, Aiden, un......more
In this pioneering reference work, Yan, Mo, and Wen explain secure detection and control algorithms for cyber-physical s......more
We live in an age of unprecedented complexity, where technology, cognitive biases, and societal systems shape our decisi......more
We live in an age of unprecedented complexity, where technology, cognitive biases, and societal systems shape our decisi......more
Nonlocal Quantum Computing Theory offers a fresh perspective on quantum computing, moving beyond the traditional qubit-b......more
This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable ......more
Our seventh and eighth graders are now "officially" teens and online activities are second nature. "From Street-smart to......more
Our seventh and eighth graders are now "officially" teens and online activities are second nature. "From Street-smart to......more
A free ebook version of this title is available through Luminos, University of California Press’s Open Access publishing......more
A free ebook version of this title is available through Luminos, University of California Press’s Open Access publishing......more
As with all elements of the digital age, navies and commercial maritime operations around the world have become increasi......more
Embark on a journey into the intersection of the metaverse and blockchain with Metaverse and Blockchain Use Cases and Ap......more
...more
Metaverse Platform Implementation: AI, Security, and Applications provides a comprehensive exploration of the engineerin......more
A groundbreaking view of the industrial models of the future Industry 5.0 is an increasingly widespread term for the com......more
Why the major risk and opportunity of AI is that humans and computers have fused, giving AI the ability to shape the fut......more
A timely technical guide to securing network-connected medical devices In Preventing Bluetooth and Wireless Attacks in I......more
Cyber space is easily the most complex thing humans have ever created. With billions of people and devices all connected......more
An engaging and accessible presentation of the most famous algorithms and applications of quantum computing The Joy of Q......more
An engaging and accessible presentation of the most famous algorithms and applications of quantum computing The Joy of Q......more
Recognize and avoid these sixty common PostgreSQL mistakes! The best mistakes to learn from are ones made by other peopl......more
Generative AI is a transformative force in smart healthcare. It can produce contents virtually indistinguishable from hu......more
The West is under challenge from the rise of China as a global power. Cyberespionage has enhanced China’s economy, milit......more
The Digital Environment and Small States in Europe delves into how the digital revolution intersects with global securit......more
"This book is designed for anyone who wants to gain knowledge and hands-on experience with working, administrating, and ......more
Securing Talent: Building and Retaining High-Performance Cybersecurity Teams by Dr. Kevin Lynn McLaughlin, PhD, offers a......more
In today’s rapidly evolving information technology landscape, cyber-attacks on company assets and IT systems are becomin......more
Securing Talent: Building and Retaining High-Performance Cybersecurity Teams by Dr. Kevin Lynn McLaughlin, PhD, offers a......more
This book provides an in-depth study on the theory of fundamental rights and the legal challenges posed by new technolog......more
...more
...more
Artificial intelligence (AI) is impacting industries worldwide by introducing new methods and altering traditional pract......more
Artificial intelligence (AI) is impacting industries worldwide by introducing new methods and altering traditional pract......more
Quantum Computing in Logistics and Supply Chain Management discusses the transformative potential of quantum computing i......more
This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It......more
Multimedia security has become one of the most important topics for organizations and individuals. Presenting important ......more