Zobrazeno 1 - 10
of 38
pro vyhledávání: '"QA76.9.A25"'
Autor:
Sergei Petrenko
Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyb
Autor:
Sergei Petrenko
Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are ba
Autor:
William Buchanan
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to d
The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecu
Autor:
Noran Shafik Fouad
This book argues that cybersecurity's informational ontology offers empirical challenges, and introduces a new interdisciplinary theoretical and conceptual framework of ‘entropic security'.Cyber-attacks have been growing exponentially in number and
Autor:
Anuj Kumar Singh, Sachin Kumar
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door for cybercriminals to penetrate hospital networks. This book covers the fundamental concepts of security and privacy in WBANs includin
SERI-2021 was a success with the presence of our valuable Guest Speakers who lead the discussion in various session in just the right direction showering the audiences with their esteemed valuable knowledge and insights in the field.The various sessi
Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffec
Autor:
J. D. Glaser
The world is becoming increasingly mobile. Smartphones and tablets have become more powerful and popular, with many of these devices now containing confidential business, financial, and personal information. This has led to a greater focus on mobile
Group theory appears to be a promising source of hard computational problems for deploying new cryptographic constructions. This reference focuses on the specifics of using groups, including in particular non-Abelian groups, in the field of cryptogra