In today's digital transformation environments, a rigorous cybersecurity approach to effective risk management - including contingency planning, outlining immediate actions, preparing post-breach responses - is central to defending organizations' interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.
This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021.
Get up and running with the fundamentals of Bitcoin and blockchainKey FeaturesLearn quick, effective, and easy ways to master blockchain and Bitcoin Understand the impact of decentralization and discover ways to tackle it Explore the future of Bitcoin and blockchain and implement them in a business networkBook DescriptionBlockchain is a distributed database that enables permanent, transparent, and secure storage of data.
This book constitutes the thoroughly refereed proceedings of the 8th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, IC3K 2016, held in Porto, Portugal, in November 2016.
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021.
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021.
Dieser zweite von vier Bänden zur Einführung in die Informatik behandelt die technische Informationsverarbeitung, von der Binärcodierung der Information über digitale Schaltungen und Rechnerarchitekturen bis hin zu maschinennaher Programmierung und dem Übergang zur (im ersten Band behandelten) problemnahen Programmierung.
This book presents the experimental development of an information-powered engine inspired by the famous thought experiment, Maxwell's demon, to understand its potential to produce energy for practical purposes.
This book constitutes the thoroughly refereedpost-conference proceedings of the 11th International Workshop on RadioFrequency Identification held in New York, USA, in June 2015.
Die Codierungstheorie, die sich mit Verfahren zur Erkennung und Korrektur von Fehlern bei Datenübertragungen und beim Auslesen von Speichermedien beschäftigt, ist heute aus Technik, Wirtschaft und aus unserem Alltag nicht mehr wegzudenken.
Die Codierungstheorie, die sich mit Verfahren zur Erkennung und Korrektur von Fehlern bei Datenübertragungen und beim Auslesen von Speichermedien beschäftigt, ist heute aus Technik, Wirtschaft und aus unserem Alltag nicht mehr wegzudenken.
Whilst the greatest effort has been made to ensure the quality of this text, due to the historical nature of this content, in some rare cases there may be minor issues with legibility.
Whilst the greatest effort has been made to ensure the quality of this text, due to the historical nature of this content, in some rare cases there may be minor issues with legibility.
Whilst the greatest effort has been made to ensure the quality of this text, due to the historical nature of this content, in some rare cases there may be minor issues with legibility.
The Science of Secrecy from Ancient Egypt to Quantum CryptographyFrom the best-selling author of Fermat's Last Theorem, The Code Book is a history of man's urge to uncover the secrets of codes, from Egyptian puzzles to modern day computer encryptions.
Whilst the greatest effort has been made to ensure the quality of this text, due to the historical nature of this content, in some rare cases there may be minor issues with legibility.
Whilst the greatest effort has been made to ensure the quality of this text, due to the historical nature of this content, in some rare cases there may be minor issues with legibility.
Whilst the greatest effort has been made to ensure the quality of this text, due to the historical nature of this content, in some rare cases there may be minor issues with legibility.
Whilst the greatest effort has been made to ensure the quality of this text, due to the historical nature of this content, in some rare cases there may be minor issues with legibility.
Whilst the greatest effort has been made to ensure the quality of this text, due to the historical nature of this content, in some rare cases there may be minor issues with legibility.