104 livres(s)
Télécharger le livre :  Round and Computational Efficiency of Multi-party Protocols
Ajouter à ma liste d'envies

Round and Computational Efficiency of Multi-party Protocols


Michele Ciampi , Luisa Siniscalchi


Cryptographic protocols are the backbone of secure digital interactions, but achieving both security and efficiency is a challenging balancing act.  The challenge is how to minimize computational costs and reduce interaction while maintaining provable security....

Parution : 2025-08-21
Format(s) : PDF
Éditeur : Springer
J'achète
203,29
Télécharger le livre :  Cyber Defense
Ajouter à ma liste d'envies

Cyber Defense


Jason Edwards


Practical and theoretical guide to understanding cyber hygiene, equipping readers with the tools to implement and maintain digital security practices Cyber Defense is a comprehensive guide that provides an in-depth exploration of essential practices to secure one’s...

Parution : 2025-06-16
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
93,60
Télécharger le livre :  Advanced Machine Learning for Cyber-Attack Detection in IoT Networks
Ajouter à ma liste d'envies

Advanced Machine Learning for Cyber-Attack Detection in IoT Networks


Diep N. Nguyen , Dinh Thai Hoang , Ekram Hossain , Nguyen Quang Hieu


Advanced Machine Learning for Cyber-Attack Detection in IoT Networks analyzes diverse machine learning techniques, including supervised, unsupervised, reinforcement, and deep learning, along with their applications in detecting and preventing cyberattacks in future IoT...

Parution : 2025-05-12
Format(s) : epub sans DRM
Éditeur : Academic Press
J'achète
213,59
Télécharger le livre :  Embedded Cryptography 3
Ajouter à ma liste d'envies

Embedded Cryptography 3


Colin O'flynn , Emmanuel Prouff , Guenael Renault , Mattieu Rivain


Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since...

Parution : 2025-01-22
Format(s) : PDF, ePub
Éditeur : Wiley-ISTE
Collection : ISTE Invoiced
J'achète
190,08
Télécharger le livre :  Embedded Cryptography 2
Ajouter à ma liste d'envies

Embedded Cryptography 2


Colin O'flynn , Emmanuel Prouff , Guenael Renault , Mattieu Rivain


Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since...

Parution : 2025-01-14
Format(s) : PDF, ePub
Éditeur : Wiley-ISTE
Collection : ISTE Invoiced
J'achète
190,08
Télécharger le livre :  Embedded Cryptography 1
Ajouter à ma liste d'envies

Embedded Cryptography 1


Colin O'flynn , Emmanuel Prouff , Guenael Renault , Mattieu Rivain


Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since...

Parution : 2025-01-07
Format(s) : PDF, ePub
Éditeur : Wiley-ISTE
Collection : ISTE Invoiced
J'achète
190,08
Télécharger le livre :  Reinforcement Learning for Cyber Operations
Ajouter à ma liste d'envies

Reinforcement Learning for Cyber Operations


Collectif


A comprehensive and up-to-date application of reinforcement learning concepts to offensive and defensive cybersecurity In Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing, a team of distinguished researchers...

Parution : 2024-12-27
Format(s) : PDF, ePub
Éditeur : Wiley-IEEE Press
J'achète
146,88
Télécharger le livre :  Quantum Nonlinear Function Obfuscation Theory and Application
Ajouter à ma liste d'envies

Quantum Nonlinear Function Obfuscation Theory and Application


Tao Shang


This book summarizes the main research results and preliminaries of quantum obfuscation and systematically introduces quantum obfuscation methods. Quantum obfuscation is an important and cross-cutting research topic in quantum cryptography and quantum computation....

Parution : 2024-10-15
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
149,79
Télécharger le livre :  Open-Source Security Operations Center (SOC)
Ajouter à ma liste d'envies

Open-Source Security Operations Center (SOC)


Waqar Anwar , Alfred Basta , Nadine Basta , Mohammad Ilyas Essar


A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC):A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran...

Parution : 2024-09-23
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
101,64
Télécharger le livre :  Encrypted Network Traffic Analysis
Ajouter à ma liste d'envies

Encrypted Network Traffic Analysis


Aswani Kumar Cherukuri , Sumaiya Thaseen Ikram , Gang Li , Xiao Liu


This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic.  The authors provide research findings and objectives in the first 5 chapters, on encrypted network...

Parution : 2024-07-24
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
58,84
Télécharger le livre :  Cybersecurity in the Transportation Industry
Ajouter à ma liste d'envies

Cybersecurity in the Transportation Industry


Noor Zaman Jhanjhi , Imdad Ali Shah


This book offers crucial solutions and insights on how transportation companies can enhance their cybersecurity management and protect their corporate reputation and revenue from the increasing risk of cyberattacks. The movement of people and goods from one location to...

Parution : 2024-07-02
Format(s) : PDF, ePub
Éditeur : Wiley-Scrivener
J'achète
224,64
Télécharger le livre :  Cryptography
Ajouter à ma liste d'envies

Cryptography


Zoubir Z. Mammeri


Cryptography An introduction to one of the backbones of the digital worldCryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global...

Parution : 2024-02-01
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
156,24
Télécharger le livre :  See Yourself in Cyber
Ajouter à ma liste d'envies

See Yourself in Cyber


Ed Adams


A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many...

Parution : 2024-01-12
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
28,80
Télécharger le livre :  Das DDR-Chiffriergerät T-310
Ajouter à ma liste d'envies

Das DDR-Chiffriergerät T-310


Wolfgang Killmann , Winfried Stephan


Dieses Buch beschreibt, unter welchen Bedingungen das in der DDR am weitesten verbreitete Fernschreibchiffriergerät sowie der dazugehörige Algorithmus vor etwa 50 Jahren zum Schutz von Staatsgeheimnissen entwickelt wurden. So können die damaligen Methoden und Ergebnisse...

Parution : 2024-01-03
Format(s) : PDF, ePub
Éditeur : Springer Spektrum
J'achète
48,22
Télécharger le livre :  Symmetric Cryptography, Volume 1
Ajouter à ma liste d'envies

Symmetric Cryptography, Volume 1


Christina Boura , Maria Naya-Plasencia


Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions. The scope of this book in two volumes is two-fold. First, it presents the most important...

Parution : 2023-11-23
Format(s) : PDF, ePub
Éditeur : Wiley-ISTE
J'achète
190,08
Télécharger le livre :  Symmetric Cryptography, Volume 2
Ajouter à ma liste d'envies

Symmetric Cryptography, Volume 2


Christina Boura , Maria Naya-Plasencia


Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions. The scope of this book in two volumes is two-fold. First, it presents the most important...

Parution : 2023-11-21
Format(s) : PDF, ePub
Éditeur : Wiley-ISTE
J'achète
190,08
Télécharger le livre :  Privacy Preservation of Genomic and Medical Data
Ajouter à ma liste d'envies

Privacy Preservation of Genomic and Medical Data


Amit Kumar Tyagi


PRIVACY PRESERVATION of GENOMIC and MEDICAL DATA Discusses topics concerning the privacy preservation of genomic data in the digital era, including data security, data standards, and privacy laws so that researchers in biomedical informatics, computer privacy and ELSI...

Parution : 2023-11-16
Format(s) : PDF, ePub
Éditeur : Wiley-Scrivener
J'achète
288,00
Télécharger le livre :  Automated Secure Computing for Next-Generation Systems
Ajouter à ma liste d'envies

Automated Secure Computing for Next-Generation Systems


Amit Kumar Tyagi


AUTOMATED SECURE COMPUTING FOR NEXT-GENERATION SYSTEMS This book provides cutting-edge chapters on machine-empowered solutions for next-generation systems for today’s society. Security is always a primary concern for each application and sector. In the last decade, many...

Parution : 2023-11-16
Format(s) : PDF, ePub
Éditeur : Wiley-Scrivener
J'achète
259,20
Télécharger le livre :  Analytic Information Theory
Ajouter à ma liste d'envies

Analytic Information Theory


Michael Drmota , Wojciech Szpankowski


Through information theory, problems of communication and compression can be precisely modeled, formulated, and analyzed, and this information can be transformed by means of algorithms. Also, learning can be viewed as compression with side information. Aimed at students...

Parution : 2023-09-07
Format(s) : PDF
J'achète
168,06
Télécharger le livre :  Quantenkommunikationsnetze
Ajouter à ma liste d'envies

Quantenkommunikationsnetze


Collectif


Dieses Buch bietet ein Tutorial über Quantenkommunikationsnetze. Die Autoren erörtern aktuelle Paradigmenwechsel in Kommunikationsnetzen, die erforderlich sind, um die einfachen Transportkonzepte der vorherrschenden Netze um Rechen- und Speicherfunktionen zu ergänzen....

Parution : 2023-05-15
Format(s) : PDF, ePub
Éditeur : Springer Vieweg
J'achète
100,92
123 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés