Profil
Mes achats
Découvrez plus de 300 000 ebooks aux formats pdf epub, audio en telechargement ou en lecture streaming. Nous vous avons sélectionné nos coups de cœur toutes categories confondues et mettons en avant l'actualité de la litterature française et internationale.
voir toutes les nouveautés
Nouveautés de la semaine
Recherche avancée
Cryptographic protocols are the backbone of secure digital interactions, but achieving both security and efficiency is a challenging balancing act. The challenge is how to minimize computational costs and reduce interaction while maintaining provable security....
Practical and theoretical guide to understanding cyber hygiene, equipping readers with the tools to implement and maintain digital security practices Cyber Defense is a comprehensive guide that provides an in-depth exploration of essential practices to secure one’s...
Advanced Machine Learning for Cyber-Attack Detection in IoT Networks analyzes diverse machine learning techniques, including supervised, unsupervised, reinforcement, and deep learning, along with their applications in detecting and preventing cyberattacks in future IoT...
Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since...
A comprehensive and up-to-date application of reinforcement learning concepts to offensive and defensive cybersecurity In Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing, a team of distinguished researchers...
This book summarizes the main research results and preliminaries of quantum obfuscation and systematically introduces quantum obfuscation methods. Quantum obfuscation is an important and cross-cutting research topic in quantum cryptography and quantum computation....
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC):A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran...
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network...
This book offers crucial solutions and insights on how transportation companies can enhance their cybersecurity management and protect their corporate reputation and revenue from the increasing risk of cyberattacks. The movement of people and goods from one location to...
Cryptography An introduction to one of the backbones of the digital worldCryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global...
A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many...
Dieses Buch beschreibt, unter welchen Bedingungen das in der DDR am weitesten verbreitete Fernschreibchiffriergerät sowie der dazugehörige Algorithmus vor etwa 50 Jahren zum Schutz von Staatsgeheimnissen entwickelt wurden. So können die damaligen Methoden und Ergebnisse...
Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions. The scope of this book in two volumes is two-fold. First, it presents the most important...
PRIVACY PRESERVATION of GENOMIC and MEDICAL DATA Discusses topics concerning the privacy preservation of genomic data in the digital era, including data security, data standards, and privacy laws so that researchers in biomedical informatics, computer privacy and ELSI...
AUTOMATED SECURE COMPUTING FOR NEXT-GENERATION SYSTEMS This book provides cutting-edge chapters on machine-empowered solutions for next-generation systems for today’s society. Security is always a primary concern for each application and sector. In the last decade, many...
Through information theory, problems of communication and compression can be precisely modeled, formulated, and analyzed, and this information can be transformed by means of algorithms. Also, learning can be viewed as compression with side information. Aimed at students...
Dieses Buch bietet ein Tutorial über Quantenkommunikationsnetze. Die Autoren erörtern aktuelle Paradigmenwechsel in Kommunikationsnetzen, die erforderlich sind, um die einfachen Transportkonzepte der vorherrschenden Netze um Rechen- und Speicherfunktionen zu ergänzen....
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Restez informé(e) des événements et promotions ebook
Paiements sécurisés