Introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
اقرأ المزيدFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
اقرأ المزيدImportant and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate ...
اقرأ المزيد
Explains the fundamentals, advanced technologies, and best practices used in planning, designing, building and operating ...
اقرأ المزيد
Offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...
اقرأ المزيد
Covering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions ...
اقرأ المزيد
In Digital Finance: Security Tokens and Unlocking the Real Potential Blockchain, readers will realize why security tokens ...
اقرأ المزيد
Thes book is a most welcome contribution to an interesting and lively subject." -- NatureOriginally published in 1974, this ...
اقرأ المزيد
This book Performance Evaluation is divided into four parts. Volume I contains Parts A through D, and the concepts developed ...
اقرأ المزيدPresents the proceedings of theSecond International Conference on Engineering and Health in Compressed Air Work, Heald at ...
اقرأ المزيد
This textbook provides a broad introduction to the fields of dynamical systems and ergodic theory. Motivated by examples ...
اقرأ المزيد
This book takes a holistic process-based ecosystem perspective on the eutrophication in the Baltic Sea, with a focus on the ...
اقرأ المزيد
The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop of the Initiative ...
اقرأ المزيدThe fears regarding food safety started long time ago, and till this very moment of ours, the international organizations ...
اقرأ المزيد
The overarching aim of this open access book is to present self-contained theory and algorithms for investigation and prediction ...
اقرأ المزيدThe main objective of this book is to develop a strategy and policy measures to enhance the formalization of the shadow economy ...
اقرأ المزيد
Provides a comprehensive overview of the concepts readers must know as they pursue careers in information systems security. ...
اقرأ المزيدProvides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems ...
اقرأ المزيد
This book constitutes the thoroughly refereed research papers contributed to a research project on the `General Theory of ...
اقرأ المزيد