Profil
Mes achats
Découvrez plus de 300 000 ebooks aux formats pdf epub, audio en telechargement ou en lecture streaming. Nous vous avons sélectionné nos coups de cœur toutes categories confondues et mettons en avant l'actualité de la litterature française et internationale.
voir toutes les nouveautés
Nouveautés de la semaine
Recherche avancée
This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The first part introduces the basic building blocks such as distributed computing and cryptography. Consensus algorithms that...
This book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security.This book’s content can be summarized in two main areas. The first area of...
This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The authors provide a variety of subjects related to the following Keywords: IoT, security, AI, deep learning, federated learning,...
This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and provides an in-depth overview of the basic background in this related field. Practical areas in both security and risk...
This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design...
This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research progress....
In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including contingency planning, outlining immediate actions, preparing post-breach responses — is central to defending organizations’...
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human...
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead...
This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts. It presents a clear picture of cybersecurity issues in municipalities and proposes a...
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book.The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation...
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been...
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications.This book is organized into five parts with a total of 15 chapters. Each area corresponds to an...
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world...
This book introduces a cross-layer design to achieve security and resilience for CPSs (Cyber-Physical Systems). The authors interconnect various technical tools and methods to capture the different properties between cyber and physical layers. Part II of this book...
This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. The authors provide a detailed description and security analysis of the most...
?This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is...
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as...
Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in...
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Restez informé(e) des événements et promotions ebook
Paiements sécurisés