nav atļauts
nav atļauts
Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).
Nepieciešamā programmatūra
Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)
Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)
Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.
.- Access Control.
.- A Graph-based Framework for ABAC Policy Enforcement and Analysis.
.- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation.
.- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence.
.- Crypto Application.
.- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security.
.- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing.
.- Towards Atomicity and Composability in Cross-Chain NFTs.
.- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM.
.- Privacy.
.- DT-Anon: Decision Tree Target-Driven Anonymization.
.- Visor: Privacy-preserving Reputation for Decentralized Marketplaces.
.- Attack.
.- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods.
.- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024.
.- Optimal Automated Generation of Playbooks.
.- ML Attack, Vulnerablity.
.- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning.
.- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning.
.- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset.
.- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping.
.- Security User Studies.
.- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics.
.- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users.
.- Differential Privacy.
.- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains.
.- Does Differential Privacy Prevent Backdoor Attacks in Practice?.