Explore Automated Market Makers (AMMs), the underlying protocols used by decentralized exchanges (DEX) to allow users to perform trades of cryptocurrencies in a decentralized way with no middlemen.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods.
This book covers the relationship of recent technologies (such as Blockchain, IoT, and 5G) with the cloud computing as well as fog computing, and mobile edge computing.
Healthcare has become an extremely important and relevant topic in day to day discussions ever since the COVID-19 pandemic has been encountered by the global population.
This book covers the relationship of recent technologies (such as Blockchain, IoT, and 5G) with the cloud computing as well as fog computing, and mobile edge computing.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022.
Das vorliegende Lehrbuch richtet sich an alle, die die Prüfung zur Schutz- und Sicherheitskraft vor einer Industrie- und Handelskammer ablegen wollen, und eignet sich zugleich als Nachschlagewerk für die Praxis sowie zur regelmäßigen Weiterbildung.
The book constitutes proceedings of the 12th Industry Symposium held in conjunction with the 18th edition of the International Conference on Distributed Computing and Intelligent Technology (ICDCIT 2022).
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data.
The Age of Decentralization talks about various decentralization technologies including Web3, decentralized identity, and decentralized storage, and how they can be incorporated in traditional tech architectures to improve technical and business performance.
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction.
This textbook highlights the essential need for a strong ethical framework in our approach to teaching of and working in computer, information and engineering sciences.
The Global South is recognized as one of the fastest growing regions in terms of Internet population as well as the region that accounts for the majority of Internet users.
Exploring the pressing issues of juvenile delinquency, victimization, and justice in Chinese societies, this book showcases contemporary research on these critical topics.
This book provides an overview of the many approaches that can adopted for programming and deploying highly-adaptive and large-scale IoT systems, with a specific focus on the key results achieved within the Fluidware research project.
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26-30, 2022.
The book is a collection of best selected research papers presented at the International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications (ICMISC 2022) held during 28 - 29 March 2022 at CMR Institute of Technology, Hyderabad, Telangana, India.
Up-to-date practice questions that cover every topic on the 2022 version of the CISM examTake the current version of the challenging CISM exam with complete confidence using the detailed information contained in this fully updated self-study guide.
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems.
This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity lab requirements and aspects to take into account when setting up new labs, all based on hands-on experience in teaching cybersecurity in higher education.
This book explores how organized crime has adapted and evolved in sync with ever-expanding technologies to update its popular image and to conduct its covert operations.
This book aims at updating the relevant computer science-related research communities, including professors, researchers, scientists, engineers and students, as well as the general reader from other disciplines, on the most recent advances in applications of methods based on Fusing Machine Learning Paradigms.