"Teoría de la información con ejercicios de aplicación busca dar a conocer de manera clara y sencilla estrategias de aplicación de los conceptos de la teoría de la información mediante el desarrollo de explicaciones y ejercicios prácticos que faciliten su comprensión.
An all-new CompTIA Security+ exam guide from top CompTIA training and exam prep expert Mike MeyersIn Mike Meyers CompTIA Security+ Certification Guide (Exam SY0-401), the bestselling author and leading authority on CompTIA A+ certification brings his highly effective methodology to IT security for the first time.
Fully revised for the CEH v8 exam objectives, this money-saving self-study bundle includes two eBooks, electronic content, and a bonus quick review guide.
Prepare for the 2015 CISSP exam with this up-to-date, money-saving study packageDesigned as a complete self-study program, this collection offers a variety of proven, exam-focused resources to use in preparation for the 2015 CISSP exam.
Get up and running with blockchain, smart contracts, NFTs, DAOs, and decentralization in no time with the help of this comprehensive guideKey FeaturesGet to grips with Web3, NFTs, DeFi, and smart contract developmentCreate fungible and non-fungible tokens, explore DAOs, and moreBuild powerful apps using Ethereum to secure transactions and create smart contractsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionWeb3, the new blockchain-based web, is often hailed as the future of the internet.
Cutting-edge social engineering testing techniques"e;Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic.
Smart grid is a new generation of power grids that is expected to enhance its reliability and reduce carbon footprint by integrating distributed resources.
This money-saving collection covers every objective for the CompTIA Security+ exam and contains exclusive bonus contentThis fully updated test preparation bundle covers every topic on the current version of the CompTIA Security+ exam.
This quick review, cram-style study guide offers 100% coverage of every topic on the latest version of the CompTIA Security+ examGet on the fast track to becoming CompTIA Security+ certified with this affordable, portable study tool.
Fully up-to-date coverage of every topic on the CEH v9 certification examThoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam.
An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike MeyersTake the latest version of the CompTIA Security+ exam (exam SY0-601) with confidence using the comprehensive information contained in this highly effective self-study resource.
Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guideThis thoroughly updated, money-saving self-study set gathers essential exam-focused resources to use in preparation for the latest Certified Ethical Hacker exam.
This up-to-date study aid contains hundreds of accurate practice questions and detailed answer explanationsCompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601) is filled with more than 1000 realistic practice questions including new performance-based questions to prepare you for this challenging exam.
This comprehensive exam guide offers 100% coverage of every topic on the CompTIA PenTest+ examGet complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-001 from this comprehensive resource.
This fun project book engages kids with coding and makingThis easy-to-follow guide offers a fun, hands-on introduction to coding for kids and anyone looking for a whimsical, light-hearted approach to making.
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography and Security provides easy, intuitive access to information on all aspects of cryptography and security.
This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security.
Absolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the emerging Ethereum ecosystem, from the basics of how its blockchain works to cutting-edge applications.
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the interconnected and often critical nature of these systems.
Implement decentralized blockchain applications to build scalable DappsKey FeaturesUnderstand the blockchain ecosystem and its terminologiesImplement smart contracts, wallets, and consensus protocolsDesign and develop decentralized applications using Bitcoin, Ethereum, and HyperledgerBook DescriptionThe Blockchain is a revolution promising a new world without middlemen.
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.
Fintech veteran and venture capitalist, Arunkumar Krishnakumar, cuts through the hype to bring us a first-hand look into how quantum computing and Blockchain together could redefine industries and life as we know it.
A practical blockchain handbook designed to take you through implementing and re-engineering banking and financial solutions and workflows using eight step-by-step projectsKey FeaturesImplement various end-to-end blockchain projects and learn to enhance present-day financial solutionsUse Ethereum, Hyperledger, and Stellar to build public and private decentralized applicationsAddress complex challenges faced in the BFSI domain using different blockchain platform servicesBook DescriptionBlockchain technology will continue to play an integral role in the banking and finance sector in the coming years.
A complete guide to understanding, developing, and testing popular security-token smart contractsKey FeaturesUnderstand key Blockchain and Ethereum platforms conceptsStep-by-step guide to developing STO smart contracts on EthereumMonetize digital tokens under various U.
Develop your cybersecurity knowledge to obtain CCNA Cyber Ops certification and gain professional skills to identify and remove potential threatsKey FeaturesExplore different security analysis tools and develop your knowledge to confidently pass the 210-255 SECOPS examGrasp real-world cybersecurity skills such as threat analysis, event correlation, and identifying malicious activityLearn through mock tests, useful tips, and up-to-date exam questionsBook DescriptionCybersecurity roles have grown exponentially in the IT industry and an increasing number of organizations have set up security operations centers (SOCs) to monitor and respond to security threats.
Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation.
This volume constitutes the refereed proceedings of the 4th International Conference on Digital Transformation and Global Society, DTGS 2019, held in St.
This book constitutes revised papers from the 12th International Conference on Large-Scale Scientific Computing, LSSC 2019, held in Sozopol, Bulgaria, in June 2019.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Gerotechnology, IWoG 2019, held in Caceres, Spain, in September 2019.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2020, CT-RSA 2020, held in San Francisco, CA, USA, in February 2020.
This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.
This book constitutes the refereed proceedings of the 13th International Conference on Provable Security, ProvSec 2019, held in Cairns, QLD, Australia, in October 2019.
This book constitutes the joint refereed proceedings of the 18th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2018, the 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018.
This book constitutes the proceedings of the 18th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2020, held in L'Aquila, Italy, in October 2020.
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019.
This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019.
This book constitutes the refereed proceedings of the 9th International Conference on Design, User Experience, and Usability, DUXU 2020, held as part of the 22nd International Conference on Human-Computer Interaction, HCII 2020, in Copenhagen, Denmark, in July 2020.
This book constitutes the refereed proceedings of the 4th International Conference on Security Standardisation Research, SSR 2018, held in Darmstadt, Germany, in November 2018.