What To Do When You Get Hacked
This book teaches you everything that you need to know about preparing your company for a...
EAN: 9781032206080
What To Do When You Get Hacked
This book teaches you everything that you need to know about preparing your company for a...
EAN: 9781032206073
Cybersecurity for Everyone
Cyberspace is a critical part of all of our lives. Unfortunately, many of those in the position...
EAN: 9780367643393
Digital Forensics in the Era of Artificial Intelligence
The book demonstrates digital forensics and cyber investigation techniques with real-world...
EAN: 9781032244686
Convergence of Blockchain, AI and IoT
This book discusses the convergence of three powerful technologies that play into the digital...
EAN: 9780367495305
Collaborative Humanities Research and Pedagogy
This edited collection of essays brings together scholars across disciplines who consider the...
EAN: 9783031055911
Personal Finance Guide for Tech Professionals
EAN: 9781484282410
Zero Trust Journey Across the Digital Estate
The book provides an end-to-end view of the Zero Trust approach across organizations' digital...
EAN: 9781032125497
Zero Trust Journey Across the Digital Estate
The book provides an end-to-end view of the Zero Trust approach across organizations' digital...
EAN: 9781032125480
International Marketing in the Network Economy
The capability of MNCs to create, transfer and combine knowledge from different locations is an...
EAN: 9781349354085
Practical Mathematical Cryptography
This book provides a clear and accessible introduction to practical mathematical cryptography....
EAN: 9780367710859
Adaptive Inventories
The goal of this Element is to provide a detailed introduction to adaptive inventories, an...
EAN: 9781108797269
Secure Networked Inference with Unreliable Data Sources
The book presents theory and algorithms for secure networked inference in the presence of...
EAN: 9789811347658
Multi-photon Quantum Secure Communication
This book explores alternative ways of accomplishing secure information transfer with incoherent...
EAN: 9789811342004
Polar Codes
It also demonstrates the calculation of split channel capacities when polar codes are employed...
EAN: 9789811344886
Fault Tolerant Architectures for Cryptography and Hardware Security
It offers insights into how the fault tolerance theories developed in the book can actually be...
EAN: 9789811338199
Permutation Polynomial Interleavers for Turbo Codes
This book investigates the permutation polynomial (PP) based interleavers for turbo codes,...
EAN: 9789811347986
Feistel Ciphers
This book provides a survey on different kinds of Feistel ciphers, with their definitions and...
EAN: 9783319841816
Hardware IP Security and Trust
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC)...
EAN: 9783319840703
Hardware Protection through Obfuscation
EAN: 9783319840680
Fading and Shadowing in Wireless Systems
This book offers a comprehensive overview of fading and shadowing in wireless channels. Newer...
EAN: 9783319850870
Proceedings of the 2nd Workshop on Communication Security
This book focuses on techniques that can be applied at the physical and data-link layers of...
EAN: 9783319865843