Computers are wonderful. The internet is fantastic. You are not safe online … unless you work at it.
Every week there are several new revelations about security weaknesses in our hardware and softwa……続きを見る
Wie reagiert ein System auf Veränderungen? Wie wird mit Laufzeitfehlern umgegangen? Dieser shortcut befasst sich mit dem Begriff und dem dahinter stehenden Konzept Resilience. Zuerst liefert der sho……続きを見る
著者:Stefan Beissel
出版社: Springer International Publishing
発売日: 2016年03月08日
This book offers readers essential orientation on cybersecurity safeguards, and first and foremost helps them find the right balance between financial expenditures and risk mitigation. This is achie……続きを見る
This book presents a holistic view on compiler assisted practical secure multi-party computation (MPC) over Boolean circuits. It discusses that two or more parties jointly evaluate a function over t……続きを見る
Mit dem Buch erlangen Ärzte, Apotheker und IT-Verantwortliche im Gesundheitswesen ein klares Verständnis zum heute notwendigen Stand von IT-Sicherheit und Datenschutz in dieser speziellen und hochve……続きを見る
著者:Stefan Strauß
出版社: Taylor & Francis
発売日: 2019年04月17日
This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age.
Privacy is among ……続きを見る
著者:Timo Steffens
出版社: Springer Berlin Heidelberg
発売日: 2020年07月21日
An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as in……続きを見る
Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptograp……続きを見る
著者:Stefano Maini
出版社: Stefano Maini
発売日: 2021年03月25日
Non conosci le Criptovalute e ti piacerebbe entrare nel mondo del denaro virtuale?
Senti spesso parlare di Bitcoin, Ethereum, Dogecoin , Ripple ma non sai bene di cosa si tratta?
Ecco il libro che f……続きを見る
Die Bedeutung der digitalen Infrastruktur, insbesondere von Netzwerken, ist in den letzten zehn Jahren kontinuierlich gestiegen. Das gilt gleichermaßen für die IT-Sicherheit. Denn ohne sichere Netzw……続きを見る
In questo libro (aggiornato nel 2022) si trattano: la sicurezza delle informazioni, i relativi processi di valutazione e trattamento del rischio (con un'ampia parte teorica bilanciata da molti esemp……続きを見る
This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication ……続きを見る
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust ……続きを見る
Explore Automated Market Makers (AMMs), the underlying protocols used by decentralized exchanges (DEX) to allow users to perform trades of cryptocurrencies in a decentralized way with no middlemen. ……続きを見る
Der vorliegende Leitfaden wurde im Rahmen eines wissenschaftlichen Forschungsprojekts entwickelt und in einer realen Praxisanwendung validiert. Das beschriebene Konzept unterstützt die Verantwortlic……続きを見る
Develop strong skills for writing cryptographic algorithms and security schemes/modules using C++23 and its new features. This book will teach you the right methods for writing advanced cryptographi……続きを見る
This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view. Homomorphic and searchable encrypti……続きを見る
This book is concerned with the nature of computer misuse and the legal and extra-legal responses to it. It explores what is meant by the term 'computer misuse' and charts its emergence as a problem……続きを見る
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes add……続きを見る
This practical book outlines the steps needed to perform penetration testing using BackBox. It explains common penetration testing scenarios and gives practical explanations applicable to a real-wor……続きを見る
This book is essential reading for those wishing to obtain a systems perspective and a broad view on the background, performance and application of the latest developments in HSPA in the context of ……続きを見る
Die Autoren beschreiben in diesem Buch, wie eine Cybersicherheitsstrategie entwickelt und umgesetzt wird. Dabei beleuchten sie die geopolitischen Einflüsse wie auch die organisatorischen und technis……続きを見る
Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else ……続きを見る
著者:Timo Steffens
出版社: Springer Berlin Heidelberg
発売日: 2018年03月10日
Professionelle Hackerangriffe (sogenannte Advanced Persistent Threats) treffen heutzutage Regierungen, Unternehmen und sogar kritische Infrastrukturen wie Flughäfen oder Stromnetzbetreiber. Herauszu……続きを見る
Die Bedeutung der digitalen Infrastruktur, insbesondere von Netzwerken, ist in den letzten zehn Jahren kontinuierlich gestiegen. Das gilt gleichermaßen für die IT-Sicherheit. Denn ohne sichere Netzw……続きを見る
This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of va……続きを見る
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discove……続きを見る
Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance. Learn by example with source code in C# and .NET, and come away with an understan……続きを見る
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical I……続きを見る