This book constitutes the selected papers from the scientific satellite events held in conjunction with the19th International Conference on Service-Oriented Computing, ICSOC 2021.
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME.
The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations.
This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application.
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively.
This book constitutes revised and selected papers from the scientific satellite events held in conjunction with the18th International Conference on Service-Oriented Computing, ICSOC 2020.
This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017.
This book, written by experts from universities and major research laboratories, addresses the hot topic of network coding, a powerful scheme for information transmission in networks that yields near-optimal throughput.
This contributed volume contains articles written by the plenary and invited speakers from the second international MATHEON Workshop 2015 that focus on applications of compressed sensing.
We already observe the positive effects of AI in almost every field, and foresee its potential to help address our sustainable development goals and the urgent challenges for the preservation of the environment.
This book studies the link between differential beamforming and differential equations which in turn enables the study of fundamental theory and methods of beamforming from a different perspective, leading to new insights into the problem and new methods to solve the problem.
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020.
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations.
Learn to develop blockchain-based distributed ledgers and deploy a Hyperledger Fabric network with concrete exercises and examplesKey FeaturesUpdated with the latest features and additions that come with Hyperledger Fabric 2Write your own smart contracts and services using Java and JavaScript on a Hyperledger Fabric networkDive into real-world blockchain challenges such as integration and scalabilityBook DescriptionBlockchain with Hyperledger Fabric - Second Edition is a refreshed and extended version of the successful book on practical Hyperledger Fabric blockchain development.
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey FeaturesPerform evidence acquisition, preservation, and analysis using a variety of Kali Linux toolsUse PcapXray to perform timeline analysis of malware and network activityImplement the concept of cryptographic hashing and imaging using Kali LinuxBook DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics.
Explore the differences between ICOs, cryptocurrencies, and tokens (offerings), enabling the reader to understand the ICO landscape, how millions were raised in minutes, and where the future of the tokenized economy is heading.
Explore distributed ledger technology, decentralization, and smart contracts and develop real-time decentralized applications with Ethereum and SolidityKey FeaturesGet to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsGain advanced insights into cryptography and cryptocurrenciesBook DescriptionBlockchain technology is a distributed ledger with applications in industries such as finance, government, and media.
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts.
Implement real-world decentralized applications using Python, Vyper, Populus, and EthereumKey FeaturesStay up-to-date with everything you need to know about the blockchain ecosystemImplement smart contracts, wallets, and decentralized applications(DApps) using Python librariesGet deeper insights into storing content in a distributed storage platformBook DescriptionBlockchain is seen as the main technological solution that works as a public ledger for all cryptocurrency transactions.
Introduction to Data Compression, Fifth Edition, builds on the success of what is widely considered the best introduction and reference text on the art and science of data compression.
This monograph offers a new foundation for information theory that is based on the notion of information-as-distinctions, being directly measured by logical entropy, and on the re-quantification as Shannon entropy, which is the fundamental concept for the theory of coding and communications.
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022.
Continuous integration with Jenkins speeds up your projects and saves you time and moneyKey FeaturesGet a perfect balance of theories and hands-on activitiesApply continuous integration and delivery to your workflowExplore concepts such as the plugin ecosystem and adaptive build parameters, among othersBook DescriptionJenkins Fundamentals teaches you everything you need to know about installing, setting up, configuring, and integrating a Jenkins server with your project to speed up the product development life cycle.
This textbook assumes very little knowledge of programming so whether you have dabbled with a little JavaScript, played with a bit of Python, written Java or have virtually no programming experience at all you will find that it is for you.
The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020.
Although cryptography plays an essential part in most modern solutions, especially in payments, cryptographic algorithms remain a black box for most users of these tools.
Amazon Web Services (AWS) provides on-demand cloud computing platforms and application programming interfaces (APIs) to individuals, companies, and govern- ments, along with distributed computing processing capacity and software tools via AWS server farms.
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Information & Operational Technology (IT & OT) security systems, IOSec 2019 , the First International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the First International Workshop on Security for Financial Critical Infrastructures and Services, FINSEC 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019.
Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming.
Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threatsKey FeaturesMake the most of Ghidra on different platforms such as Linux, Windows, and macOSUnlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scriptingLearn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomwarePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionWritten by David Alvarez Perez, a senior malware analyst at Gen Digital Inc.