The three volume set LNCS 13155, 13156, and 13157 constitutes the refereed proceedings of the 21st International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2021, which was held online during December 3-5, 2021.
This book constitutes the refereed proceedings of the 8th International Symposium, UNet 2022, held in Montreal, QC, Canada, during October 25-27, 2022.
This book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022.
This edited collection of essays brings together scholars across disciplines who consider the collaborative work of John Matthews Manly and Edith Rickert, philologists, medievalists and early modernists, cryptologists, and education reformers.
This book contains revised selected papers from the 28th International Conference on Selected Areas in Cryptography, SAC 2021, held as a virtual event September and October 2021.
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India-Kolkata Chapter, India, during December 2-4, 2021.
This book constitutes the refereed proceedings of the 52nd International Simulation and Gaming Association Conference, ISAGA 2021, held in Indore, India, during September 6-10, 2021.
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021.
This two-volume set constitutes the post-conference proceedings of the 5th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2021, held in October 2021.
This book constitutes the refereed proceedings of the 9th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2021, held in San Antonio, TX, USA, in 2021.
This book offers a structured algebraic and geometric approach to the classification and construction of quantum codes for topological quantum computation.
This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security.
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26-30, 2022.
This book constitutes the refereed proceedings of the 11th International Conference on Cloud Computing and Services Science, CLOSER 2021, Virtual Event, during April 28-30, 2021.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022.
"Teoría de la información con ejercicios de aplicación busca dar a conocer de manera clara y sencilla estrategias de aplicación de los conceptos de la teoría de la información mediante el desarrollo de explicaciones y ejercicios prácticos que faciliten su comprensión.
An all-new CompTIA Security+ exam guide from top CompTIA training and exam prep expert Mike MeyersIn Mike Meyers CompTIA Security+ Certification Guide (Exam SY0-401), the bestselling author and leading authority on CompTIA A+ certification brings his highly effective methodology to IT security for the first time.
Fully revised for the CEH v8 exam objectives, this money-saving self-study bundle includes two eBooks, electronic content, and a bonus quick review guide.
Prepare for the 2015 CISSP exam with this up-to-date, money-saving study packageDesigned as a complete self-study program, this collection offers a variety of proven, exam-focused resources to use in preparation for the 2015 CISSP exam.
Get up and running with blockchain, smart contracts, NFTs, DAOs, and decentralization in no time with the help of this comprehensive guideKey FeaturesGet to grips with Web3, NFTs, DeFi, and smart contract developmentCreate fungible and non-fungible tokens, explore DAOs, and moreBuild powerful apps using Ethereum to secure transactions and create smart contractsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionWeb3, the new blockchain-based web, is often hailed as the future of the internet.
Cutting-edge social engineering testing techniques"e;Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic.
Smart grid is a new generation of power grids that is expected to enhance its reliability and reduce carbon footprint by integrating distributed resources.
This money-saving collection covers every objective for the CompTIA Security+ exam and contains exclusive bonus contentThis fully updated test preparation bundle covers every topic on the current version of the CompTIA Security+ exam.
This quick review, cram-style study guide offers 100% coverage of every topic on the latest version of the CompTIA Security+ examGet on the fast track to becoming CompTIA Security+ certified with this affordable, portable study tool.
Fully up-to-date coverage of every topic on the CEH v9 certification examThoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam.
An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike MeyersTake the latest version of the CompTIA Security+ exam (exam SY0-601) with confidence using the comprehensive information contained in this highly effective self-study resource.
Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guideThis thoroughly updated, money-saving self-study set gathers essential exam-focused resources to use in preparation for the latest Certified Ethical Hacker exam.
This up-to-date study aid contains hundreds of accurate practice questions and detailed answer explanationsCompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601) is filled with more than 1000 realistic practice questions including new performance-based questions to prepare you for this challenging exam.
This comprehensive exam guide offers 100% coverage of every topic on the CompTIA PenTest+ examGet complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-001 from this comprehensive resource.
This fun project book engages kids with coding and makingThis easy-to-follow guide offers a fun, hands-on introduction to coding for kids and anyone looking for a whimsical, light-hearted approach to making.
This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security.
Absolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the emerging Ethereum ecosystem, from the basics of how its blockchain works to cutting-edge applications.
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the interconnected and often critical nature of these systems.
Implement decentralized blockchain applications to build scalable DappsKey FeaturesUnderstand the blockchain ecosystem and its terminologiesImplement smart contracts, wallets, and consensus protocolsDesign and develop decentralized applications using Bitcoin, Ethereum, and HyperledgerBook DescriptionThe Blockchain is a revolution promising a new world without middlemen.
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.
Fintech veteran and venture capitalist, Arunkumar Krishnakumar, cuts through the hype to bring us a first-hand look into how quantum computing and Blockchain together could redefine industries and life as we know it.