This book studies the link between differential beamforming and differential equations which in turn enables the study of fundamental theory and methods of beamforming from a different perspective, leading to new insights into the problem and new methods to solve the problem.
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020.
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations.
Learn to develop blockchain-based distributed ledgers and deploy a Hyperledger Fabric network with concrete exercises and examplesKey FeaturesUpdated with the latest features and additions that come with Hyperledger Fabric 2Write your own smart contracts and services using Java and JavaScript on a Hyperledger Fabric networkDive into real-world blockchain challenges such as integration and scalabilityBook DescriptionBlockchain with Hyperledger Fabric - Second Edition is a refreshed and extended version of the successful book on practical Hyperledger Fabric blockchain development.
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey FeaturesPerform evidence acquisition, preservation, and analysis using a variety of Kali Linux toolsUse PcapXray to perform timeline analysis of malware and network activityImplement the concept of cryptographic hashing and imaging using Kali LinuxBook DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics.
Explore the differences between ICOs, cryptocurrencies, and tokens (offerings), enabling the reader to understand the ICO landscape, how millions were raised in minutes, and where the future of the tokenized economy is heading.
Explore distributed ledger technology, decentralization, and smart contracts and develop real-time decentralized applications with Ethereum and SolidityKey FeaturesGet to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsGain advanced insights into cryptography and cryptocurrenciesBook DescriptionBlockchain technology is a distributed ledger with applications in industries such as finance, government, and media.
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts.
Implement real-world decentralized applications using Python, Vyper, Populus, and EthereumKey FeaturesStay up-to-date with everything you need to know about the blockchain ecosystemImplement smart contracts, wallets, and decentralized applications(DApps) using Python librariesGet deeper insights into storing content in a distributed storage platformBook DescriptionBlockchain is seen as the main technological solution that works as a public ledger for all cryptocurrency transactions.
Introduction to Data Compression, Fifth Edition, builds on the success of what is widely considered the best introduction and reference text on the art and science of data compression.
This monograph offers a new foundation for information theory that is based on the notion of information-as-distinctions, being directly measured by logical entropy, and on the re-quantification as Shannon entropy, which is the fundamental concept for the theory of coding and communications.
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022.
This textbook assumes very little knowledge of programming so whether you have dabbled with a little JavaScript, played with a bit of Python, written Java or have virtually no programming experience at all you will find that it is for you.
The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020.
Although cryptography plays an essential part in most modern solutions, especially in payments, cryptographic algorithms remain a black box for most users of these tools.
Amazon Web Services (AWS) provides on-demand cloud computing platforms and application programming interfaces (APIs) to individuals, companies, and govern- ments, along with distributed computing processing capacity and software tools via AWS server farms.
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Information & Operational Technology (IT & OT) security systems, IOSec 2019 , the First International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the First International Workshop on Security for Financial Critical Infrastructures and Services, FINSEC 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019.
Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming.
Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threatsKey FeaturesMake the most of Ghidra on different platforms such as Linux, Windows, and macOSUnlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scriptingLearn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomwarePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionWritten by David Alvarez Perez, a senior malware analyst at Gen Digital Inc.
In einer Welt, die zunehmend von digitalen Innovationen geprägt ist, gewinnen zwei Technologien besonders an Bedeutung: Non-Fungible Tokens (NFTs) und Künstliche Intelligenz (KI).
For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media.
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities.
Focused coverage of every topic on the current version of the CompTIA CySA+ examGet on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool.
Master the art of designing, developing, and operating secure infrastructures on Google CloudKey FeaturesPrepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for building a secure and compliant cloud environmentExplore advanced concepts like Security Command Center, BeyondCorp Zero Trust, and container securityBook DescriptionGoogle Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments.
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door for cybercriminals to penetrate hospital networks.
Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacksKey FeaturesExplore blockchain concepts such as cryptography, consensus algorithms, and security assumptionsArchitect network security for mission-critical decentralized apps (Dapps) using design security considerationsConsider various deployment and operational aspects while building a blockchain networkBook DescriptionBlockchain adoption has extended from niche research to everyday usage.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
Prepare for the 2015 CISSP exam with this up-to-date, money-saving study packageDesigned as a complete self-study program, this collection offers a variety of proven, exam-focused resources to use in preparation for the 2015 CISSP exam.
Like art appreciation and music appreciation, this code appreciation book invites the readers to look relaxedly into major programming concepts used in many disciplines through short stories set in alphabetical order.
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts.