Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race.
Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure.
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods.
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations.
An expert guide to implementing fast, secure, and scalable decentralized applications that work with thousands of users in real timeKey FeaturesImplement advanced features of the Ethereum network to build powerful decentralized applicationsBuild smart contracts on different domains using the programming techniques of Solidity and VyperExplore the architecture of Ethereum network to understand advanced use cases of blockchain development Book DescriptionEthereum is one of the commonly used platforms for building blockchain applications.
This book constitutes selected papers of the Second International Conference on Advanced Communication Systems and Information Security, ACOSIS 2019, held in Marrakesh, Morocco, in November 2019.
This book constitutes the refereed proceedings of the 18th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ADHOC-NOW 2019, held in Luxembourg, in October 2019.
This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020.
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005).
Explore distributed ledger technology, decentralization, and smart contracts and develop real-time decentralized applications with Ethereum and SolidityKey FeaturesGet to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsGain advanced insights into cryptography and cryptocurrenciesBook DescriptionBlockchain technology is a distributed ledger with applications in industries such as finance, government, and media.
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden.
If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers for digital transformation and innovation, Digital Fluency is your handy guide.
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market request, but also because this science has created possibilities for people of investigation and solved many problems that some time ago seemed to be insolvable.
This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, held in St.
Explore distributed ledger technology, decentralization, and smart contracts and develop real-time decentralized applications with Ethereum and SolidityKey FeaturesGet to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsGain advanced insights into cryptography and cryptocurrenciesBook DescriptionBlockchain technology is a distributed ledger with applications in industries such as finance, government, and media.
This two-volume set LNCS 11662 and 11663 constitutes the refereed proceedings of the 16th International Conference on Image Analysis and Recognition, ICIAR 2019, held in Waterloo, ON, Canada, in August 2019.
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020.
This book is a collection of peer-reviewed best selected research papers presented at the Fifth International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2024), organized by School of Electronics and Engineering, VIT - AP University, Amaravati, Andhra Pradesh, India, during 5-6 January 2024.
An insight into the biometric industry and the steps for successful deployment Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces.
The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019.
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME.
This book discovers what it will take to reindustrialize the previous industrial powerhouses in order to offset the advantages of cheap labor suppliers dominating the industrial sector by exploring the current situation of the production, processing, and manufacturing industries.