This book constitutes refereed research works presented at International Ethical Hacking Conference, eHaCON 2024, the 5th international conference of its type to be held in Kolkata, India in March 2024. The eHaCON 2024 focuses on the new challenges a...Lasīt vairāk
This book constitutes refereed research works presented at International Ethical Hacking Conference, eHaCON 2024, the 5th international conference of its type to be held in Kolkata, India in March 2024. The eHaCON 2024 focuses on the new challenges a...Lasīt vairāk
This edited book provides an optimal portrayal of the principles and applications related to network security. The book is thematically divided into five segments: Part A describes the introductory issues related to network security with some concept...Lasīt vairāk
This edited book provides an optimal portrayal of the principles and applications related to network security. The book is thematically divided into five segments: Part A describes the introductory issues related to network security with some concept...Lasīt vairāk
This book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding re...Lasīt vairāk
This book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding re...Lasīt vairāk
This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems u...Lasīt vairāk
This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems u...Lasīt vairāk