This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identificatio...Lasīt vairāk
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Lasīt vairāk
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Lasīt vairāk
This book provides a comprehensive introduction to blockchain and distributed ledger technology (DLT). Intended as an applied guide for hands-on practitioners, this book includes detailed examples and...Lasīt vairāk
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Lasīt vairāk
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Lasīt vairāk
This book covers the entire spectrum of hardware design including integrated circuits, embedded systems, and design automation tools. It also captures recent advances in various attack and defense methods. This book addresses vario...Lasīt vairāk
Edge Computing and Intelligence is a new technical discipline that researches anddevelops theories, methods, technologies, and application systems for providing the fastand efficient processing and intelligent decision using the big data generated fr...Lasīt vairāk
In this smart era, business innovation and industrial intelligence are making the way for a smart future in which smart factories, intelligent machines, networked processes, edge computing, blockchain technology, and Big Data (including Data Science...Lasīt vairāk
Explore practical cryptographic methods using Python to secure data, encrypt communications, and implement real-world security techniques for modern applications Key Features Learn cryptographic techniques with Python for real-...Lasīt vairāk
Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret key algorithms (symmetric ciphers) have been designed as Feistel networks, and it is possible to design many others. The most fam...Lasīt vairāk
Data Analytics using Machine Learning Techniques on Cloud Platforms examines how machine learning and cloud computing combine to drive data-driven decision-making across industries. Covering ML techniques, cloud-based analytics tools, and security...Lasīt vairāk
This set of story-based learning projects links performances and tasks with computing codes to show how a machine translates our goals into its language There is a global need to become less fearful of coding, as it improves communi...Lasīt vairāk
What is the difference between a code and a cipher? How did Caesar send secret messages? How does RSA end-to-end encryption actually work? In this fascinating little book, packed with numerous helpful illustrations and worked examples, polymath Stev...Lasīt vairāk
This book explores the critical intersection of human behavior, cybersecurity, and the transformative potential of quantum technologies. It delves into the vulnerabilities and resilience of human intelligence in the face of cyber threats, examinin...Lasīt vairāk
This book explores the critical intersection of human behavior, cybersecurity, and the transformative potential of quantum technologies. It delves into the vulnerabilities and resilience of human intelligence in the face of cyber threats, examinin...Lasīt vairāk
Like art appreciation and music appreciation, this code appreciation book invites the readers to look relaxedly into major programming concepts used in many disciplines through short stories set in alphabetical order. Some students fear technology...Lasīt vairāk
Mathematical Foundations of Blockchains is a two-volume work on blockchains. Blockchain is a novel paradigm for a distributed ledger. Volume 1 is on the fundamentals of blockchains and consists of an overview of blockchains, essential eleme...Lasīt vairāk
Mathematical Foundations of Blockchains is a two-volume work on blockchains. Blockchain is a novel paradigm for a distributed ledger. Volume 1 is on the fundamentals of blockchains and consists of an overview of blockchains, essential elements of bl...Lasīt vairāk