Integrate an end-to-end logistic chain using IBM Blockchain and IoT platformsKey FeaturesExplore practical implementation of ledger technology in the IoT architectureStudy security best practices for your smart devicesUnderstand Blockchain implementation for end-to-end IoT solutionsBook DescriptionBlockchain has been the hot topic of late thanks to cryptocurrencies.
Best practices for protecting critical data and systemsInformation Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures.
Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide.
From the #1 Name in Professional CertificationPrepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.
Written by the #1 name in IT security certification training, fully revised for the latest exam release, and featuring 750+ practice questions plus 24 hours of audio lecturesCISSP Practice Exams, Second Edition is the ideal companion to Shon Harris bestselling CISSP All-in-One Exam Guide.
Learn quick and effective techniques for developing blockchain-based distributed ledgers with easeKey FeaturesDiscover why blockchain is a game changer in the technology landscapeSet up blockchain networks using Hyperledger FabricWrite smart contracts at speed with Hyperledger ComposerBook DescriptionBlockchain and Hyperledger are open source technologies that power the development of decentralized applications.
Explore the blockchain-based decentralized platform and understand how Ethereum works with Dapps examplesKey FeaturesExplore the Ethereum ecosystem and understand the latest research on the platformBuild decentralized apps (Dapps) using smart contracts and Ethereum with the help of practical examplesLearn to make your decentralized applications fast and highly secureBook DescriptionEthereum is a blockchain-based, decentralized computing platform that allows running smart contracts.
Build real-world projects like a smart contract deployment platform, betting apps, wallet services, and much more using blockchainKey FeaturesApply blockchain principles and features for making your life and business betterUnderstand Ethereum for smart contracts and DApp deploymentTackle current and future challenges and problems relating to blockchainBook DescriptionBlockchain applications provide a single-shared ledger to eliminate trust issues involving multiple stakeholders.
Understand how blockchain works and explore a variety of strategies to implement it in your organization effectivelyKey FeaturesBecome familiar with business challenges faced by companies when using blockchainDiscover how companies implement blockchain to monetize and secure their dataStudy real-world examples to understand blockchain and its use in organizationsBook DescriptionIn addition to cryptocurrencies, blockchain-based apps are being developed in different industries such as banking, supply chain, and healthcare to achieve digital transformation and enhance user experience.
This two-volume set constitutes the proceedings of the Third Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2019, held in Volgograd, Russia, in September 2019.
This book constitutes the proceedings of the 18th International Conference on Information Technologies and Mathematical Modelling, ITMM 2019, named after A.
This book constitutes the revised and extended papers of the First International Conference on Innovations in Digital Economy, SPBU IDE 2019, held in St.
This book constitutes the refereed post-conference proceedings of the IFIP TC 3 Open Conference on Computers in Education, OCCE 2020, held in Mumbai, India, in January 2020.
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.
The Author of this new volume on ant communication demonstrates that information theory is a valuable tool for studying the natural communication of animals.
This book constitutes the proceedings of the 20th China National Conference on Computational Linguistics, CCL 2021, held in Hohhot, China, in August 2021.
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.
This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.
This book constitutes the proceedings of the 19th International Conference on Passive and Active Measurement, PAM 2018, held in Berlin, Germany, in March 2018.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018.
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2021, held in Kristiansand, Norway, in August 2021.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.
This book constitutes the refereed post-conference proceedings of the First International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2017, held in Warsaw, Poland, in September 2017.
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017.
This book constitutes the refereed proceedings of the 24th International Conference on DNA Computing and Molecular Programming, DNA 24, held in Jinan, China, in October 2018.
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018.
This book constitutes revised selected papers from the 9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, held in Singapore, in April 2018.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.
This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on the Arithmetic of Finite Field, WAIFI 2018, held in Bergen, Norway, in June 2018.
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021.
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021.
This book constitutes the joint refereed proceedings of the 19th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2019, and the 12th Conference on Internet of Things and Smart Spaces, ruSMART 2019.
This book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, LATIN 2021, which was held in October 2021.
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021.