The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources.
The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources.
This reference text provides the theoretical foundations, the emergence, and the application areas of Blockchain in an easy-to-understand manner that would be highly helpful for the researchers, academicians, and industry professionals to understand the disruptive potentials of Blockchain.
This reference text provides the theoretical foundations, the emergence, and the application areas of Blockchain in an easy-to-understand manner that would be highly helpful for the researchers, academicians, and industry professionals to understand the disruptive potentials of Blockchain.
The text focuses on the basics of Python programming fundamentals and introduction to present-day applications in technology and the upcoming state-of-art trends in a comprehensive manner.
The text focuses on the basics of Python programming fundamentals and introduction to present-day applications in technology and the upcoming state-of-art trends in a comprehensive manner.
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security.
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
As more and more engineering departments and companies choose to use Python, this book provides an essential introduction to this open-source, free-to-use language.
As more and more engineering departments and companies choose to use Python, this book provides an essential introduction to this open-source, free-to-use language.
Machine Learning, Cyber Security, and Blockchain in Smart Environment: Application and Challenges provides far-reaching insights into the recent techniques forming the backbone of smart environments, and addresses the vulnerabilities that give rise to the challenges in real-word implementation.
Machine Learning, Cyber Security, and Blockchain in Smart Environment: Application and Challenges provides far-reaching insights into the recent techniques forming the backbone of smart environments, and addresses the vulnerabilities that give rise to the challenges in real-word implementation.
This new book discusses the concepts while also highlighting the challenges in thefield of quantum cryptography and also covering cryptographic techniques and cybersecurity techniques, in a single volume.
This new book discusses the concepts while also highlighting the challenges in thefield of quantum cryptography and also covering cryptographic techniques and cybersecurity techniques, in a single volume.
Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need.
Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need.
Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors.
Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors.
This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions.
This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions.
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security.
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security.
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.
The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications.
The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.