排序依

共有8277

Big Data and Security: 4th International Conference, Icbds 2022, Xiamen, China, December 8-12, 2022, Proceedings

Big Data and Security: 4th International Conference, Icbds 2022, Xiamen, China, December 8-12, 2022, Proceedings

  • Ingram,出版日期:2023-05-31

This book constitutes the refereed proceedings of the 4th International Conference on Big Data and Security, ICBDS 2022,......more

Change Management for Risk Professionals

Change Management for Risk Professionals

Change Management for Risk Professionals addresses a need in the marketplace for risk professionals to learn about chang......more

Cybersecurity for Entrepreneurs

Cybersecurity for Entrepreneurs

One data breach can close a small business before it even gets going. With all that is involved in starting a new busine......more

Cloud Security: Concepts, Applications and Perspectives

Cloud Security: Concepts, Applications and Perspectives

Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud com......more

Applied Cryptography and Network Security: 21st International Conference, Acns 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I

Applied Cryptography and Network Security: 21st International Conference, Acns 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I

  • Ingram,出版日期:2023-05-29

The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference o......more

Applied Cryptography and Network Security: 21st International Conference, Acns 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II

Applied Cryptography and Network Security: 21st International Conference, Acns 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II

  • Ingram,出版日期:2023-05-28

The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference o......more

Internet of Things: Security and Privacy in Cyberspace

Internet of Things: Security and Privacy in Cyberspace

  • Ingram,出版日期:2023-05-28

This book covers major areas of device and data security and privacy related to the Internet of Things (IoT). It also pr......more

Quantum Computing Environments

Quantum Computing Environments

  • Ingram,出版日期:2023-05-27

This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition to......more

Building Secure Business Models Through Blockchain Technology: Tactics, Methods, Limitations, and Performance

Building Secure Business Models Through Blockchain Technology: Tactics, Methods, Limitations, and Performance

  • Ingram,出版日期:2023-05-26

Blockchain technology provided a buzz-seeking opportunity for all industries to implement improved corporate procedures ......more

The Definitive Guide to PCI Dss Version 4: Documentation, Compliance, and Management

The Definitive Guide to PCI Dss Version 4: Documentation, Compliance, and Management

This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI......more

Quantum Supremacy: How the Quantum Computer Revolution Will Change Everything

Quantum Supremacy: How the Quantum Computer Revolution Will Change Everything

An exhilarating tour of humanity’s next great technological achievement--quantum computing--which may eventually unravel......more

Security Engineering for Embedded and Cyber-Physical Systems

Security Engineering for Embedded and Cyber-Physical Systems

  • Ingram,出版日期:2023-05-20

Digital transformation, also known as Industry 4.0, Smart Industry, and Smart Manufacturing, is at the top of leaders’ a......more

Codes, Cryptology and Information Security: 4th International Conference, C2si 2023, Rabat, Morocco, May 29-31, 2023, Proceedings

Codes, Cryptology and Information Security: 4th International Conference, C2si 2023, Rabat, Morocco, May 29-31, 2023, Proceedings

  • Ingram,出版日期:2023-05-19

This book constitutes the refereed proceedings of the 4th International Conference on Codes, Cryptology and Information ......more

Quantum analysis of selected organic compounds

Quantum analysis of selected organic compounds

M. Vennila is a researcher who delves into the world of quantum mechanics and its application to organic chemistry. Her ......more

Data Exfiltration Malware, Detection, and Prevention Technologies

Data Exfiltration Malware, Detection, and Prevention Technologies

DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for dat......more

Practical OPNsense: Building Enterprise Firewalls with Open Source

Practical OPNsense: Building Enterprise Firewalls with Open Source

Simple packet filters are becoming a thing of the past. Even the open-source domain is moving towards Next-Generation Fi......more

Cryptographic City: Decoding the Smart Metropolis

Cryptographic City: Decoding the Smart Metropolis

"Coyne examines urban living through the frame of cryptography, diving into the technologies, instruments, and processes......more

Crypto: The Insights You Need from Harvard Business Review

Crypto: The Insights You Need from Harvard Business Review

The crypto era has arrived, and business will never be the same. Real applications of crypto technology are growing expo......more

Centrality Routing and Blockchain Technologies in Distributed Networks

Centrality Routing and Blockchain Technologies in Distributed Networks

"Centrality Routing and Blockchain Technologies in Distributed Networks" is an enlightening and comprehensive exploratio......more

Cryptography for Payment Professionals

Cryptography for Payment Professionals

Although cryptography plays an essential part in most modern solutions, especially in payments, cryptographic algorithms......more

The Right to Data Protection: Individual and Structural Dimensions of Data Protection in Eu Law

The Right to Data Protection: Individual and Structural Dimensions of Data Protection in Eu Law

This book advances an approach that combines the individual and the structural, systemic dimensions of data protection. ......more

Glocal Policy and Strategies for Blockchain: Building Ecosystems and Sustainability

Glocal Policy and Strategies for Blockchain: Building Ecosystems and Sustainability

  • Ingram,出版日期:2023-05-08

"This book explores a policy-based approach to applying Blockchains worldwide, introducing the features, advantages, and......more

Quantum Information at both High and Low Energy Levels

Quantum Information at both High and Low Energy Levels

"Quantum Information at both High and Low Energy Levels" is an engaging and informative book written by Dr. Nicholas Con......more

Blockchain, Iot and AI Technologies for Supply Chain Management

Blockchain, Iot and AI Technologies for Supply Chain Management

Supply chain management, often known as SCM, refers to the extensive variety of operations that are required to plan, mo......more

Perspectives on Blockchain Technology and Responsible Investing

Perspectives on Blockchain Technology and Responsible Investing

  • Ingram,出版日期:2023-05-01

The transformation of green investment and climate finance by blockchain establishes the relationship between global eff......more

Perspectives on Blockchain Technology and Responsible Investing

Perspectives on Blockchain Technology and Responsible Investing

  • Ingram,出版日期:2023-05-01

The transformation of green investment and climate finance by blockchain establishes the relationship between global eff......more

DeFi for the Diaspora: Creating the Foundation to a More Equitable and Sustainable Global Black Economy Through Decentralized Finance

DeFi for the Diaspora: Creating the Foundation to a More Equitable and Sustainable Global Black Economy Through Decentralized Finance

One-part Black history, one-part Black futurism "DeFi for the Diaspora" examines the history of money to underscore the ......more

Machine Learning Safety

Machine Learning Safety

Machine learning algorithms allow computers to learn without being explicitly programmed. Their application is now sprea......more

Cyberwire Cybersecurity First Principles

Cyberwire Cybersecurity First Principles

The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles, Rick Howard, the Chie......more

Protecting User Privacy in Web Search Utilization

Protecting User Privacy in Web Search Utilization

  • Ingram,出版日期:2023-04-25

"The objective is to publish both disciplinary, multidisciplinary and interdisciplinary works on questions related to ex......more

Redefining Application Security For the Modern World

Redefining Application Security For the Modern World

In 2023, cloud-native architecture has become the de facto standard for modern applications. But beyond the velocity and......more

Security, Trust and Privacy Models, and Architectures in Iot Environments

Security, Trust and Privacy Models, and Architectures in Iot Environments

  • Ingram,出版日期:2023-04-21

This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments. The a......more

The AI Wave in Defence Innovation: Assessing Military Artificial Intelligence Strategies, Capabilities, and Trajectories

The AI Wave in Defence Innovation: Assessing Military Artificial Intelligence Strategies, Capabilities, and Trajectories

An international and interdisciplinary perspective on the adoption and governance of artificial intelligence (AI) and ma......more

The AI Wave in Defence Innovation: Assessing Military Artificial Intelligence Strategies, Capabilities, and Trajectories

The AI Wave in Defence Innovation: Assessing Military Artificial Intelligence Strategies, Capabilities, and Trajectories

An international and interdisciplinary perspective on the adoption and governance of artificial intelligence (AI) and ma......more

Privacy-Preserving Machine Learning

Privacy-Preserving Machine Learning

Keep sensitive user data safe and secure without sacrificing the performance and accuracy of your machine learning model......more

Handbook of Research on Blockchain Technology and the Digitalization of the Supply Chain

Handbook of Research on Blockchain Technology and the Digitalization of the Supply Chain

  • Ingram,出版日期:2023-04-21

Blockchain is a recent technology that is promising to revolutionize the way supply chains are designed and operated. Re......more

High-Speed Networks: A Tutorial

High-Speed Networks: A Tutorial

This book provides practical knowledge and skills on high-speed networks, emphasizing on Science Demilitarized Zones (Sc......more

Cybertax: Managing the Risks and Results

Cybertax: Managing the Risks and Results

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax--Managing the Risks and Results is a must......more

Cybertax: Managing the Risks and Results

Cybertax: Managing the Risks and Results

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax--Managing the Risks and Results is a must......more

Topics in Cryptology - Ct-Rsa 2023: Cryptographers’ Track at the Rsa Conference 2023, San Francisco, Ca, Usa, April 24-27, 2023, Proceedings

Topics in Cryptology - Ct-Rsa 2023: Cryptographers’ Track at the Rsa Conference 2023, San Francisco, Ca, Usa, April 24-27, 2023, Proceedings

  • Ingram,出版日期:2023-04-19

This book constitutes the refereed proceedings of the Cryptographer’s Track at the RSA Conference 2023, CT-RSA 2023, hel......more

Intelligent Safety: How Anyone Can Use New Technology to Protect Themselves from Cybercrime

Intelligent Safety: How Anyone Can Use New Technology to Protect Themselves from Cybercrime

Turn the tables on cybercriminals. Keep your loved ones safe. We live much of our personal and professional lives online......more

Cyber Threat Intelligence

Cyber Threat Intelligence

CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, ......more

The Nice Cyber Security Framework: Cyber Security Intelligence and Analytics

The Nice Cyber Security Framework: Cyber Security Intelligence and Analytics

This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity E......more

Applied Quantum Cryptanalysis

Applied Quantum Cryptanalysis

Today we witness an explosive growth in attention to Q-computing. Q-computing technologies, along with artificial intell......more

How to Measure Anything in Cybersecurity Risk

How to Measure Anything in Cybersecurity Risk

"Cybersecurity has become one of the biggest risks facing companies today. There is a need to provide the tools and info......more

Proof of Work: Blockchain Provocations 20112021

Proof of Work: Blockchain Provocations 20112021

A beautifully produced anthology of crypto-artist, writer, and hacker Rhea Myers’s pioneering blockchain art, along with......more

Arm Assembly Language and Reverse Engineering

Arm Assembly Language and Reverse Engineering

"Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier--Arm pro......more

Crypto stego protecting digital secrets

Crypto stego protecting digital secrets

Crypto steganography (often simply called "stego") is a technique for concealing secret digital information within other......more

Crypto techniques for secure data distribution

Crypto techniques for secure data distribution

Cryptographic techniques are essential for secure data distribution, especially when sensitive information needs to be t......more

DNA Cryptography Using Quantum Computing

DNA Cryptography Using Quantum Computing

The prime concern in data communication over a transmission channel is the security of the data which is being exchanged......more

Quantum DNA Cryptography Advanced Security

Quantum DNA Cryptography Advanced Security

The prime concern in data communication over a transmission channel is the security of the data which is being exchanged......more

Machine Learning Techniques for Cybersecurity

Machine Learning Techniques for Cybersecurity

This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, priva......more

Security, Privacy and Data Analytics: Select Proceedings of Ispda 2021

Security, Privacy and Data Analytics: Select Proceedings of Ispda 2021

  • Ingram,出版日期:2023-04-09

This book constitutes refereed proceedings of the International Conference on Security, Privacy and Data Analytics, ISPD......more

Detecting Spliced Images Using Quantum Machine Learning Techniques

Detecting Spliced Images Using Quantum Machine Learning Techniques

Image forgery is a growing concern in today’s era of extensive use of social media. It has changed the way people normal......more

The Gambler and the Scholars: Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology

The Gambler and the Scholars: Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology

In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and ......more

Global Coordination for Crypto Taxation Foundation

Global Coordination for Crypto Taxation Foundation

Global Coordination for Crypto Taxation Foundation" is a comprehensive book that delves into the complexities surroundin......more

Secure Data Management for Online Learning Applications

Secure Data Management for Online Learning Applications

With the increasing use of e-learning, technology has not only revolutionized the way businesses operate but has also im......more

Emerging Ict Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies

Emerging Ict Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies

This book introduces some fundamentals of information and communication technology (ICT) and other current and future te......more

Security and Trust Management: 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings

Security and Trust Management: 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings

  • Ingram,出版日期:2023-04-04

This book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022......more

Foundations and Practice of Security: 15th International Symposium, Fps 2022, Ottawa, On, Canada, December 12-14, 2022, Revised Selected Papers

Foundations and Practice of Security: 15th International Symposium, Fps 2022, Ottawa, On, Canada, December 12-14, 2022, Revised Selected Papers

  • Ingram,出版日期:2023-04-01

This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Securi......more

An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection

An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection

This book provides an introduction to secret sharing, a key technology for practical applications and higher-level crypt......more

Creators Take Control

Creators Take Control

A leading legal scholar offers a compelling new theory to explain the meteoric rise of non-fungible tokens (NFTs) and th......more

Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The Shield Methodology

Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The Shield Methodology

  • Ingram,出版日期:2023-03-28

With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Securit......more

Web3: The Insights You Need from Harvard Business Review

Web3: The Insights You Need from Harvard Business Review

  • Ingram,出版日期:2023-03-28

Web3 may be the next big disrupter in business. Don’t be caught unprepared. Blockchain and crypto aren’t just for specul......more

Constructive Side-Channel Analysis and Secure Design: 14th International Workshop, Cosade 2023, Munich, Germany, April 3-4, 2023, Proceedings

Constructive Side-Channel Analysis and Secure Design: 14th International Workshop, Cosade 2023, Munich, Germany, April 3-4, 2023, Proceedings

  • Ingram,出版日期:2023-03-28

This book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis ......more

83上一頁 1 2 3 4 5 6 7 8 9 10 下一頁 跳到

外文書書籍分類