This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identificatio...Lasīt vairāk
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Lasīt vairāk
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Lasīt vairāk
This book provides a comprehensive introduction to blockchain and distributed ledger technology (DLT). Intended as an applied guide for hands-on practitioners, this book includes detailed examples and...Lasīt vairāk
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Lasīt vairāk
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...Lasīt vairāk
This book covers the entire spectrum of hardware design including integrated circuits, embedded systems, and design automation tools. It also captures recent advances in various attack and defense methods. This book addresses vario...Lasīt vairāk
Edge Computing and Intelligence is a new technical discipline that researches anddevelops theories, methods, technologies, and application systems for providing the fastand efficient processing and intelligent decision using the big data generated fr...Lasīt vairāk
In this smart era, business innovation and industrial intelligence are making the way for a smart future in which smart factories, intelligent machines, networked processes, edge computing, blockchain technology, and Big Data (including Data Science...Lasīt vairāk
Explore practical cryptographic methods using Python to secure data, encrypt communications, and implement real-world security techniques for modern applications Key Features Learn cryptographic techniques with Python for real-...Lasīt vairāk
Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret key algorithms (symmetric ciphers) have been designed as Feistel networks, and it is possible to design many others. The most fam...Lasīt vairāk
Data Analytics using Machine Learning Techniques on Cloud Platforms examines how machine learning and cloud computing combine to drive data-driven decision-making across industries. Covering ML techniques, cloud-based analytics tools, and security...Lasīt vairāk
This set of story-based learning projects links performances and tasks with computing codes to show how a machine translates our goals into its language There is a global need to become less fearful of coding, as it improves communi...Lasīt vairāk
What is the difference between a code and a cipher? How did Caesar send secret messages? How does RSA end-to-end encryption actually work? In this fascinating little book, packed with numerous helpful illustrations and worked examples, polymath Stev...Lasīt vairāk
This book explores the critical intersection of human behavior, cybersecurity, and the transformative potential of quantum technologies. It delves into the vulnerabilities and resilience of human intelligence in the face of cyber threats, examinin...Lasīt vairāk
This book explores the critical intersection of human behavior, cybersecurity, and the transformative potential of quantum technologies. It delves into the vulnerabilities and resilience of human intelligence in the face of cyber threats, examinin...Lasīt vairāk
Like art appreciation and music appreciation, this code appreciation book invites the readers to look relaxedly into major programming concepts used in many disciplines through short stories set in alphabetical order. Some students fear technology...Lasīt vairāk
Mathematical Foundations of Blockchains is a two-volume work on blockchains. Blockchain is a novel paradigm for a distributed ledger. Volume 1 is on the fundamentals of blockchains and consists of an overview of blockchains, essential eleme...Lasīt vairāk
Mathematical Foundations of Blockchains is a two-volume work on blockchains. Blockchain is a novel paradigm for a distributed ledger. Volume 1 is on the fundamentals of blockchains and consists of an overview of blockchains, essential elements of bl...Lasīt vairāk
Cryptographic protocols are the backbone of secure digital interactions, but achieving both security and efficiency is a challenging balancing act. The challenge is how to minimize computational costs and reduce interaction while maintaining prov...Lasīt vairāk
Unlocking the future of image and video coding with AI-based Image and Video Coding: Methods, Standards, and Applications, we can explore the revolutionary impact of deep learning technologies on image and video compression. This book is...Lasīt vairāk
An immersive, alarming, sharp-eyed journey into the bizarre world of computer code, told through the authors attempt to become a coder himself....Lasīt vairāk
This book guides readers from the foundations of quantum mechanics through advanced quantum algorithms (such as Shors and Grovers) and state-of-the-art machine learning methods. By illustrating how these concepts apply to everyday engineering ch...Lasīt vairāk
The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the desired security properties, Tamarin either verifies the protocol or provides counter examples...Lasīt vairāk
Sērija : Cambridge Series in Statistical and Probabilistic Mathematics
(Izdošanas datums: 31-Aug-2025, Hardback, Izdevniecība: Cambridge University Press, ISBN-13: 9781009521437)
Random graphs, also known as complex networks, model the structure of a population. The spread of opinions and diseases on these structures is much different from the usual ODE models. This book will be of interest to mathematicians, computer scienti...Lasīt vairāk
This extensive revision of the 2007 book Random Graph Dynamics, covering the current state of mathematical research in the field, is ideal for researchers and graduate students. It considers a small number of types of graphs, primarily the configur...Lasīt vairāk
The hands-on exercises and practical examples in the guide helps to get a better understanding in Hederas core services. The focus on each core chapter is to get a deeper understanding and the its usage in decentralized applications Key...Lasīt vairāk
The textbook covers digital communication systems, in both theory and application. The authors present a complete, up-to-date coverage on the principles of digital communications. The book covers a broad range of topics in digital communications,...Lasīt vairāk
This textbook provides a comprehensive introduction to the fundamentals of Polar, LDPC and Turbo Codes. These codes have become essential cornerst...Lasīt vairāk
Introduction to Modern Cryptography is the most relied-upon source in the field. The book provides a mathematically rigorous yet accessible treatment of this fascinating subject. This is an updated edition of the most widely used introduction to cry...Lasīt vairāk
This book analyzes blockchain in the metaverse ecosystem and its future, starting with clear definitions of AI, blockchain, and Metaverse. It discusses the evolution of the blockchain and addresses government involvement, virtual real estate, and...Lasīt vairāk
(Izdošanas datums: 31-Jul-2025, Hardback, Izdevniecība: John Wiley & Sons Inc, ISBN-13: 9781394337019)
Practical and theoretical guide to understanding cyber hygiene, equipping readers with the tools to implement and maintain digital security practices Cyber Defense is a comprehensive cyber-hygiene guide that provides an in-depth e...Lasīt vairāk
Present energy systems are undergoing a radical transformation, driven by the urgent need to address the climate change crisis. At the same time, we are witnessing the sharp growth of energy data and a revolution of advanced technologies, with art...Lasīt vairāk
Mixes experiences in art, coding, music, dance, choreography, video, and stage design. Many people relax when coding is introduced as a language, rather than math. This book mixes experiences in art, coding, music, dance, choreograp...Lasīt vairāk
Mixes experiences in art, coding, music, dance, choreography, video, and stage design. Many people relax when coding is introduced as a language, rather than math. This book mixes experiences in art, coding, music, dance, choreograp...Lasīt vairāk
Invites the readers to look relaxedly into major programming concepts used in many disciplines through short stories set in alphabetical order. Some students fear technology with programming behind it, and shy away from the word coding. Coding h...Lasīt vairāk
This set of story-based learning projects links performances and tasks with computing codes to show how a machine translates our goals into its language. There is a global need to become less fearful of coding, as it improves commu...Lasīt vairāk
While coding is intertwined into simple facts, Nature Appreciation shows ways we appreciate nature, thus, helping us learn in a playful, nonjudgmental way. If asked what all people can agree with, we can see one answer...Lasīt vairāk
If asked what all people can agree with, we can see one answer: we all love Nature, one way or another. In this book, impossible creatures (one can perceive as atoms, molecules, or minerals) playfully deliver computer codes, with an underlying not...Lasīt vairāk
Although cryptography plays an essential part in most modern solutions, especially in payments, cryptographic algorithms remain a black box for most users of these tools. Just as a sane backend developer does not drill down into low-level disk acc...Lasīt vairāk
This book offers a deep dive into quantum teleportation and immune noise models, providing cutting-edge solutions to challenges in noisy quantum communication systems. It covers advanced theories and practical methods for building robust, high-fid...Lasīt vairāk
Post-Quantum Cryptography Algorithms and Approaches for IoT and Blockchain Security, Volume 138 the latest release in the Advances in Computers series, presents detailed coverage of innovations in computer hardware, software, theory, de...Lasīt vairāk
(Izdošanas datums: 29-May-2025, Hardback, Izdevniecība: Cambridge University Press, ISBN-13: 9781009638630)
This Element develops a theory of institutional acceleration to explain the transformation to a digital economy through a cluster of frontier technologies: artificial intelligence, blockchain, quantum computing, cryptography, and low-earth orbit inf...Lasīt vairāk