(Išleidimo metai: 06-Oct-2006, Hardback, Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783540245025)
In todays unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology no...Daugiau...
(Išleidimo metai: 05-Nov-2024, Multiple-component retail product, Leidėjas: Springer-Verlag New York Inc., ISBN-13: 9780387286020)
The Handbook of Security will build on the existing Handbook of Data Communications and Networks, and The Complete Handbook of the Internet. It will try to cover every aspect of computer and network security. This will include an analysis of the phys...Daugiau...
(Išleidimo metai: 09-Aug-2024, Hardback, Leidėjas: Springer-Verlag New York Inc., ISBN-13: 9780387271590)
Public Key Infrastructures (PKI) are a trust management technology for public keys, consisting of several interconnected Certifying Authorities (CAs). The CAs issue certificates that establish ownership of public keys, which can be used to support...Daugiau...
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also disc...Daugiau...
This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented...Daugiau...
This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It examines theories and various state-of-the-art technologies and methodologies. Starting with a survey of the latest soluti...Daugiau...
The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data scie...Daugiau...
In 25 concise steps, you will learn the basics of blockchain technology. Mathematical formulas, program code, and computer science jargon are not used. No previous knowledge in computer science, mathematics, programming, or cryptography is re...Daugiau...
This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving d...Daugiau...
This book introduces readers to various threats faced during design and fabrication by todays integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or IC Overproduction, insertion of maliciou...Daugiau...
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers...Daugiau...
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethica...Daugiau...
Pro Oracle Identity and Access Management Suite presents a process-based approach to implementing Oracles Identity and Access Management Suite. Learn everything from basic installation through t...Daugiau...
When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to manipulate, there are still critical security bugs that can be exploited. In response to this issue, author Kunal Relan offers a c...Daugiau...
Cliff Wang, Ryan M. Gerdes, Yong Guan, Sneha Kumar Kasera
(Išleidimo metai: 26-Oct-2016, Hardback, Leidėjas: Springer-Verlag New York Inc., ISBN-13: 9781493965991)
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Availabl...Daugiau...
This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industr...Daugiau...
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and pract...Daugiau...
(Išleidimo metai: 14-Sep-2016, Hardback, Leidėjas: Springer-Verlag New York Inc., ISBN-13: 9781493964550)
This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer...Daugiau...
Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
Serija: Undergraduate Texts in Mathematics
(Išleidimo metai: 10-Sep-2016, Paperback / softback, Leidėjas: Springer-Verlag New York Inc., ISBN-13: 9781493939381)
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for...Daugiau...
This book describes the design, development, and testing of a novel digital watermarking technique for color images using Magic Square and Ridgelet transforms. The novel feature of the method is that it generates and uses multiple copies of the digit...Daugiau...
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selecte...Daugiau...