Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student and professional who wants to learn about cybersecurity adaptations.
Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student and professional who wants to learn about cybersecurity adaptations.
An Introduction to Mathematical Proofs presents fundamental material on logic, proof methods, set theory, number theory, relations, functions, cardinality, and the real number system.
An Introduction to Mathematical Proofs presents fundamental material on logic, proof methods, set theory, number theory, relations, functions, cardinality, and the real number system.
An Elementary Transition to Abstract Mathematics will help students move from introductory courses to those where rigor and proof play a much greater role.
An Elementary Transition to Abstract Mathematics will help students move from introductory courses to those where rigor and proof play a much greater role.
Machine Learning, Cyber Security, and Blockchain in Smart Environment: Application and Challenges provides far-reaching insights into the recent techniques forming the backbone of smart environments, and addresses the vulnerabilities that give rise to the challenges in real-word implementation.
Machine Learning, Cyber Security, and Blockchain in Smart Environment: Application and Challenges provides far-reaching insights into the recent techniques forming the backbone of smart environments, and addresses the vulnerabilities that give rise to the challenges in real-word implementation.
This new book discusses the concepts while also highlighting the challenges in thefield of quantum cryptography and also covering cryptographic techniques and cybersecurity techniques, in a single volume.
This new book discusses the concepts while also highlighting the challenges in thefield of quantum cryptography and also covering cryptographic techniques and cybersecurity techniques, in a single volume.
The New Mathematical Coloring Book (TNMCB) includes striking results of the past 15-year renaissance that produced new approaches, advances, and solutions to problems from the first edition.
The New Mathematical Coloring Book (TNMCB) includes striking results of the past 15-year renaissance that produced new approaches, advances, and solutions to problems from the first edition.
This unique and contemporary text not only offers an introduction to proofs with a view towards algebra and analysis, a standard fare for a transition course, but also presents practical skills for upper-level mathematics coursework and exposes undergraduate students to the context and culture of contemporary mathematics.
This unique and contemporary text not only offers an introduction to proofs with a view towards algebra and analysis, a standard fare for a transition course, but also presents practical skills for upper-level mathematics coursework and exposes undergraduate students to the context and culture of contemporary mathematics.
Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments.
Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments.
Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors.
Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors.
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals.
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals.