Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure.
Mastering Corda provides you with a consistent, linear, and paced path to learning Corda and building modern enterprise-grade decentralized applications.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019.
Explore Automated Market Makers (AMMs), the underlying protocols used by decentralized exchanges (DEX) to allow users to perform trades of cryptocurrencies in a decentralized way with no middlemen.
This book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018.
Certification and Security in Inter-Organizational E-Services presents the proceedings of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC in August 2004 in Toulouse, France.
This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.
Integrate an end-to-end logistic chain using IBM Blockchain and IoT platformsKey FeaturesExplore practical implementation of ledger technology in the IoT architectureStudy security best practices for your smart devicesUnderstand Blockchain implementation for end-to-end IoT solutionsBook DescriptionBlockchain has been the hot topic of late thanks to cryptocurrencies.
Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques.
Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today.
This book constitutes the proceedings of the 4th International Conference on Electronic Voting, E-Vote-ID 2019, held in Bregenz, Austria, in October 2019.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Smart Card Research and Advanced Applications, CARDIS 2018, held in Monpellier, France, in November 2018.
The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019.
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020.
This book constitutes the proceedings of the satellite workshops held around the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, held in Kamakura, Japan, in June 2021.
This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020.
Learn how to use AI and blockchain to build decentralized intelligent applications (DIApps) that overcome real-world challengesKey FeaturesUnderstand the fundamental concepts for converging artificial intelligence and blockchainApply your learnings to build apps using machine learning with Ethereum, IPFS, and MoiBitGet well-versed with the AI-blockchain ecosystem to develop your own DIAppsBook DescriptionAI and blockchain are two emerging technologies catalyzing the pace of enterprise innovation.
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, WISA 2020, held in Jeju Island, South Korea, in August 2020.
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021.
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019.
CORPORATE CYBERSECURITY An insider s guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).
Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacksKey FeaturesExplore blockchain concepts such as cryptography, consensus algorithms, and security assumptionsArchitect network security for mission-critical decentralized apps (Dapps) using design security considerationsConsider various deployment and operational aspects while building a blockchain networkBook DescriptionBlockchain adoption has extended from niche research to everyday usage.
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey FeaturesPerform evidence acquisition, preservation, and analysis using a variety of Kali Linux toolsUse PcapXray to perform timeline analysis of malware and network activityImplement the concept of cryptographic hashing and imaging using Kali LinuxBook DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics.
This book constitutes the proceedings of the Third International Conference on Blockchain, ICBC 2020, held as part of SCF 2020, during September 18-20, 2020.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Smart Card Research and Advanced Applications, CARDIS 2019, held in Prague, Czech Republic, in November 2019.
Learn what the Blockchain is, what the differences between available blockchain platforms are, how to work with Oracle's Blockchain Cloud Service, and how Blockchain can change the direction of your Oracle work and the focus of your customers.