Originally adopted in military networks as a means of ensuring secure communication when confronted with the threats of jamming and interception, spread-spectrum systems are now the core of commercial applications such as mobile cellular and satellite communication.
ulti-carrier modulation Orthogonal Frequency Division Multi- Mplexing (OFDM) particularly has been successfully applied to a wide variety of digital communications applications over the past several years.
Introduction The International Federation for Information Processing (IFIP) is a non-profit umbrella organization for national societies working in the field of information processing.
A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables.
In 1829, Louis Braille, a young organist in a Paris church, blind since age 3, invented the well-known code for the blind, still in common use today all over the world and named after him.
The book underscores AI's transformative impact on reshaping physical, digital, and biological boundaries, converging with technologies like robotics, IoT, 3D printing, genetic engineering, and quantum computing-termed Web 3.
Learn to develop blockchain-based distributed ledgers and deploy a Hyperledger Fabric network with concrete exercises and examplesKey FeaturesUpdated with the latest features and additions that come with Hyperledger Fabric 2Write your own smart contracts and services using Java and JavaScript on a Hyperledger Fabric networkDive into real-world blockchain challenges such as integration and scalabilityBook DescriptionBlockchain with Hyperledger Fabric - Second Edition is a refreshed and extended version of the successful book on practical Hyperledger Fabric blockchain development.
Presenting innovative research-oriented ideas, and the implementation and socioeconomic applications of internet of things-based network, Challenges and Solutions in Internet of Things-Based Smart Applications showcases smart waste management, optical technologies for internet of things and remote patient monitoring and data analysis.
Presenting innovative research-oriented ideas, and the implementation and socioeconomic applications of internet of things-based network, Challenges and Solutions in Internet of Things-Based Smart Applications showcases smart waste management, optical technologies for internet of things and remote patient monitoring and data analysis.
Learn how to use AI and blockchain to build decentralized intelligent applications (DIApps) that overcome real-world challengesKey FeaturesUnderstand the fundamental concepts for converging artificial intelligence and blockchainApply your learnings to build apps using machine learning with Ethereum, IPFS, and MoiBitGet well-versed with the AI-blockchain ecosystem to develop your own DIAppsBook DescriptionAI and blockchain are two emerging technologies catalyzing the pace of enterprise innovation.
Explore distributed ledger technology, decentralization, and smart contracts and develop real-time decentralized applications with Ethereum and SolidityKey FeaturesGet to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsGain advanced insights into cryptography and cryptocurrenciesBook DescriptionBlockchain technology is a distributed ledger with applications in industries such as finance, government, and media.
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team programLeverage the homefield advantage to stay ahead of your adversariesUnderstand core adversarial tactics and techniques, and protect pentesters and pentesting assetsBook DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches.
Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacksKey FeaturesExplore blockchain concepts such as cryptography, consensus algorithms, and security assumptionsArchitect network security for mission-critical decentralized apps (Dapps) using design security considerationsConsider various deployment and operational aspects while building a blockchain networkBook DescriptionBlockchain adoption has extended from niche research to everyday usage.
Fintech veteran and venture capitalist, Arunkumar Krishnakumar, cuts through the hype to bring us a first-hand look into how quantum computing and Blockchain together could redefine industries and life as we know it.
Learn quick and effective techniques for developing blockchain-based distributed ledgers with easeKey FeaturesDiscover why blockchain is a game changer in the technology landscapeSet up blockchain networks using Hyperledger FabricWrite smart contracts at speed with Hyperledger ComposerBook DescriptionBlockchain and Hyperledger are open source technologies that power the development of decentralized applications.
Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide.
Best practices for protecting critical data and systemsInformation Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures.
An expert guide to implementing fast, secure, and scalable decentralized applications that work with thousands of users in real timeKey FeaturesImplement advanced features of the Ethereum network to build powerful decentralized applicationsBuild smart contracts on different domains using the programming techniques of Solidity and VyperExplore the architecture of Ethereum network to understand advanced use cases of blockchain development Book DescriptionEthereum is one of the commonly used platforms for building blockchain applications.
Explore the entire Hyperledger blockchain family, including frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and tools such as Composer, Explorer, and Caliper.
Cutting-edge social engineering testing techniques"e;Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic.
Learn the foundations of blockchain technology - its core concepts and algorithmic solutions across cryptography, peer-to-peer technology, and game theory.
Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease Key FeaturesWrite your own chaincode/smart contracts using Golang on hyperledger networkBuild and deploy decentralized applications (DApps)Dive into real world blockchain challenges such as integration and scalabilityBook DescriptionBBlockchain and Hyperledger technologiesare hot topics today.
Implement real-world decentralized applications using Python, Vyper, Populus, and EthereumKey FeaturesStay up-to-date with everything you need to know about the blockchain ecosystemImplement smart contracts, wallets, and decentralized applications(DApps) using Python librariesGet deeper insights into storing content in a distributed storage platformBook DescriptionBlockchain is seen as the main technological solution that works as a public ledger for all cryptocurrency transactions.
Implement blockchain principles in your choice of domain using Ethereum Key FeaturesBuild permissioned enterprise-grade blockchain applications from scratchImplement Blockchain-as-a-Service to enterprises in terms of deployment and securityAchieve privacy in blockchains using proxy re-encryption algorithmsBook DescriptionThe increasing growth in blockchain use is enormous, and it is changing the way business is done.
Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques.
Written by the #1 name in IT security certification training, fully revised for the latest exam release, and featuring 750+ practice questions plus 24 hours of audio lecturesCISSP Practice Exams, Second Edition is the ideal companion to Shon Harris bestselling CISSP All-in-One Exam Guide.
The best fully integrated study system for the CompTIA Security+ exam is now an enhanced e-book featuring practice exams, videos, e-flashcards, and more!
The Best Fully Integrated Study System Available for Exam CAS-001With hundreds of practice questions and lab exercises, CASP CompTIA Advanced Security Practitioner Certification Study Guide covers what you need to know and shows you how to prepare for this challenging exam.