Mobile, wearable, and self-driving telephones are just a few examples of modern distributed networks that generate enormous amount of information every day.
Mobile, wearable, and self-driving telephones are just a few examples of modern distributed networks that generate enormous amount of information every day.
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more.
In this volume, contributors from academia, industry, and policy explore the inter-connections among economic development, socio-political democracy and defense and security in the context of a profound transformation, spurred by globalization and supported by the rapid development of information and communication technologies (ICT).
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes.
This text integrates different mobility data handling processes, from database management to multi-dimensional analysis and mining, into a unified presentation driven by the spectrum of requirements raised by real-world applications.
If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers for digital transformation and innovation, Digital Fluency is your handy guide.
The Language of Cybersecurity defines 52 terms that every business professional should know about cybersecurity, even professionals who are not specialists.
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lackinguntil now.
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lackinguntil now.
Mastering Corda provides you with a consistent, linear, and paced path to learning Corda and building modern enterprise-grade decentralized applications.
Mastering Corda provides you with a consistent, linear, and paced path to learning Corda and building modern enterprise-grade decentralized applications.
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them.
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them.