Menu

Data encryption (31)

Order by
idioma
Algebraic Geometry for Coding Theory and Cryptography
Algebraic Geometry for Coding Theory and Cryptogr...
Everett W. Howe...
publisher: Springer
year: 2017
description:Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the ...
Animal Biometrics
Animal Biometrics
Santosh Kumar; Sanjay...
publisher: Springer
year: 2017
description:This book presents state-of-the-art methodologies and a comprehensive introduction to the recognition and representation of species and individual animals based on their physiological and phenotypic appearances, biometric characteristics, and morphol...
Applied Cryptanalysis : Breaking Ciphers in the Real World
Applied Cryptanalysis : Breaking Ciphers in the Real...
Mark Stamp; Richard...
publisher: John Wiley & Sons
year: 2007
description:The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cry...
Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python
Sanjib Sinha
publisher: Springer
year: 2017
description:Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking wi...
Blockchain Basics
Blockchain Basics
Daniel Drescher
publisher: Springer
year: 2017
description:In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Te...
Cyber Deception
Cyber Deception
Sushil Jajodia;...
publisher: Springer
year: 2016
description:This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The...
Cyber-security of SCADA and Other Industrial Control Systems
Cyber-security of SCADA and Other Industrial Control...
Edward J. M. Colbert...
publisher: Springer
year: 2016
description:This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is g...
Data Analytics and Decision Support for Cybersecurity
Data Analytics and Decision Support for Cybersecu...
Iván Palomares Carrascosa...
publisher: Springer
year: 2017
description:The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data scie...
Digital Fingerprinting
Digital Fingerprinting
Cliff Wang; Ryan...
publisher: Springer
year: 2016
description:This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques fo...
Digital Watermarking
Digital Watermarking
Mohammad Ali Nematollahi...
publisher: Springer
year: 2017
description:This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs. It also presents new a...
Elements of Cloud Computing Security
Elements of Cloud Computing Security
Mohammed M. Al...
publisher: Springer
year: 2016
description:This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how clo...
Elements of Cloud Storage Security
Elements of Cloud Storage Security
Tatiana Galibus...
publisher: Springer
year: 2016
description:This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industr...