(Išleidimo metai: 27-Feb-2025, EPUB+DRM, Leidėjas: IT Governance Publishing, ISBN-13: 9781787785687)
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organiz...Daugiau...
(Išleidimo metai: 27-Feb-2025, PDF+DRM, Leidėjas: IT Governance Publishing, ISBN-13: 9781787785694)
A concise introduction to the NIST CSF 2.0The NIST CSF (Cybersecurity Framework) 2.0 is designed to protect organizations from cyber attacks. Although the CSF was developed to help US organizations involved in infrastructure to systematically organiz...Daugiau...
The current digital signature methods like RSA, DSA, and ECDSA are relatively simple to understand, and their signing and verification processes operate in comparable time frames. However, in the quantum computing era, cryptographic methods must be d...Daugiau...
The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Curacao, during March 4-8, 2024.The number of 36 full an...Daugiau...
The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Curacao, during March 4-8, 2024.The number of 36 full an...Daugiau...
Serija: Wireless Communications and Networking Technologies
(Išleidimo metai: 13-Feb-2025, PDF+DRM, Leidėjas: Taylor & Francis Ltd, ISBN-13: 9781040296769)
This book proposes robust solutions for securing a network against intrusions for data privacy and safety. It includes theoretical models, commercialization of validated models, and case studies. Explains the integration of technologies such as artif...Daugiau...
Serija: Wireless Communications and Networking Technologies
(Išleidimo metai: 13-Feb-2025, EPUB+DRM, Leidėjas: Taylor & Francis Ltd, ISBN-13: 9781040296783)
This book proposes robust solutions for securing a network against intrusions for data privacy and safety. It includes theoretical models, commercialization of validated models, and case studies. Explains the integration of technologies such as artif...Daugiau...
This book constitutes the refereed proceedings of the 20th European Workshop on Computer Performance Engineering, EPEW 2024, held in Venice, Italy, on June 14, 2024.The 10 papers presented in this volume together with one invited talk were carefully...Daugiau...
This book constitutes the refereed proceedings of the 20th European Workshop on Computer Performance Engineering, EPEW 2024, held in Venice, Italy, on June 14, 2024.The 10 papers presented in this volume together with one invited talk were carefully...Daugiau...
This book presents the proceedings of the Privacy Symposium 2024. The book features a collection of high-quality research works and professional perspectives on personal data protection and emerging technologies. Gathering legal and technology expert...Daugiau...
This book presents the proceedings of the Privacy Symposium 2024. The book features a collection of high-quality research works and professional perspectives on personal data protection and emerging technologies. Gathering legal and technology expert...Daugiau...
Automate vulnerability scanning, network monitoring, and web application security using Python scripts, while exploring real-world case studies and emerging trends like AI and ML in security automationKey FeaturesGain future-focused insights into usi...Daugiau...
Automate vulnerability scanning, network monitoring, and web application security using Python scripts, while exploring real-world case studies and emerging trends like AI and ML in security automationKey FeaturesGain future-focused insights into usi...Daugiau...
This book constitutes the refereed proceedings of the 25th International Conference on Information Security Applications, WISA 2024, held in Jeju Island, South Korea, during August 21-23, 2024.The 28 full papers included in this book were carefully r...Daugiau...
This book constitutes the refereed proceedings of the 25th International Conference on Information Security Applications, WISA 2024, held in Jeju Island, South Korea, during August 21-23, 2024.The 28 full papers included in this book were carefully r...Daugiau...
This book is a collection of best-selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2024), held at Jalpaiguri Government Engineering College (JGEC), Jalpaiguri, West Bengal, India, du...Daugiau...
This book is a collection of best-selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2024), held at Jalpaiguri Government Engineering College (JGEC), Jalpaiguri, West Bengal, India, du...Daugiau...
Entdecken Sie die Zukunft der Kryptographie mit āCodebasierte Post-Quanten-Kryptografie - Goppa Codes und das McEliece Kryptosystemā. Dieses Buch bietet eine grundlegende und detaillierte Einführung in eines der sichersten Kryptosysteme unser...Daugiau...
Entdecken Sie die Zukunft der Kryptographie mit āCodebasierte Post-Quanten-Kryptografie - Goppa Codes und das McEliece Kryptosystemā. Dieses Buch bietet eine grundlegende und detaillierte Einführung in eines der sichersten Kryptosysteme unser...Daugiau...
This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. The 26 full papers and 8 short paper...Daugiau...