VLSI devices downscaling is a very significant part of the design to improve the performance of VLSI industry outcomes, which results in high speed and low power of operation of integrated devices.
VLSI devices downscaling is a very significant part of the design to improve the performance of VLSI industry outcomes, which results in high speed and low power of operation of integrated devices.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics.
Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain.
Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain.
Written in accessible language without mathematical formulas, this short book provides an overview of the wide and varied applications of artificial intelligence (AI) across the spectrum of physical sciences.
Written in accessible language without mathematical formulas, this short book provides an overview of the wide and varied applications of artificial intelligence (AI) across the spectrum of physical sciences.
This book is for people who work in the tech industry-computer and data scientists, software developers and engineers, designers, and people in business, marketing or management roles.
This book is for people who work in the tech industry-computer and data scientists, software developers and engineers, designers, and people in business, marketing or management roles.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics.
Unleashing the Art of Digital Forensics is intended to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector.
Unleashing the Art of Digital Forensics is intended to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector.
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed.
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed.
Securing the Nation's Critical Infrastructures: A Guide for the 2021-2025 Administration is intended to help the United States Executive administration, legislators, and critical infrastructure decision-makers prioritize cybersecurity, combat emerging threats, craft meaningful policy, embrace modernization, and critically evaluate nascent technologies.
Securing the Nation's Critical Infrastructures: A Guide for the 2021-2025 Administration is intended to help the United States Executive administration, legislators, and critical infrastructure decision-makers prioritize cybersecurity, combat emerging threats, craft meaningful policy, embrace modernization, and critically evaluate nascent technologies.
Introduction to Machine Learning with Applications in Information Security, Second Edition provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, reinforced via realistic applications.
Introduction to Machine Learning with Applications in Information Security, Second Edition provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, reinforced via realistic applications.
Machine Learning, Cyber Security, and Blockchain in Smart Environment: Application and Challenges provides far-reaching insights into the recent techniques forming the backbone of smart environments, and addresses the vulnerabilities that give rise to the challenges in real-word implementation.
Machine Learning, Cyber Security, and Blockchain in Smart Environment: Application and Challenges provides far-reaching insights into the recent techniques forming the backbone of smart environments, and addresses the vulnerabilities that give rise to the challenges in real-word implementation.
Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world?
Security systems have become an integral part of the building and large complex setups, and intervention of the computational intelligence (CI) paradigm plays an important role in security system architecture.
Security systems have become an integral part of the building and large complex setups, and intervention of the computational intelligence (CI) paradigm plays an important role in security system architecture.
Conceptually, as well as practically, digitalization is similar to the implementation of a modern computation model - the model may be a centralized setup using a mainframe or it may be extended to an N-tier architecture.
Conceptually, as well as practically, digitalization is similar to the implementation of a modern computation model - the model may be a centralized setup using a mainframe or it may be extended to an N-tier architecture.
This new book discusses the concepts while also highlighting the challenges in thefield of quantum cryptography and also covering cryptographic techniques and cybersecurity techniques, in a single volume.
This new book discusses the concepts while also highlighting the challenges in thefield of quantum cryptography and also covering cryptographic techniques and cybersecurity techniques, in a single volume.
Cypherpunk Ethics explores the moral worldview of the cypherpunks, a movement that advocates the use of strong digital cryptography-or crypto, for short-to defend individual privacy and promote institutional transparency in the digital age.
Cypherpunk Ethics explores the moral worldview of the cypherpunks, a movement that advocates the use of strong digital cryptography-or crypto, for short-to defend individual privacy and promote institutional transparency in the digital age.