'A fascinating exposé of the world behind your screen. Timely, often disturbing, and so important'
Caroline Criado Perez, author of Invisible Women
'Takes us beyond Zuckerberg, Bezos et al to a murk……続きを見る
出版社: Springer International Publishing
発売日: 2020年01月09日
This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019. The 26 full papers presen……続きを見る
出版社: Springer International Publishing
発売日: 2022年01月31日
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the……続きを見る
出版社: Springer International Publishing
発売日: 2019年11月22日
The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.
The 43 ful……続きを見る
出版社: Springer International Publishing
発売日: 2019年11月22日
The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.
The 43 ful……続きを見る
出版社: Springer International Publishing
発売日: 2019年09月10日
The development of “intelligent” systems that can take decisions and perform autonomously might lead to faster and more consistent decisions. A limiting factor for a broader adoption of AI technolog……続きを見る
Build your expertise in the BPF virtual machine in the Linux kernel with this practical guide for systems engineers. You’ll not only dive into the BPF program lifecycle but also learn to write appli……続きを見る
Malware involves the worms, Trojan horses and viruses that do malicious activities on mobile and computers by controlling and destroying software processes. Data from Tencent Mobile Security Laborat……続きを見る
Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a W……続きを見る
Discover how to write high-quality character driver code, interface with userspace, work with chip memory, and gain an in-depth understanding of working with hardware interrupts and kernel synchroni……続きを見る
Introduction to Number Theory is a classroom-tested, student-friendly text that covers a diverse array of number theory topics, from the ancient Euclidean algorithm for finding the greatest common d……続きを見る
著者:Dishan Francis
出版社: Packt Publishing
発売日: 2019年08月09日
Become an expert at managing enterprise identity infrastructure by leveraging Active Directory
Key Features
Explore the new features in Active Directory Domain Service
Manage your Active Directory ……続きを見る
Combinatorics and Number Theory of Counting Sequences is an introduction to the theory of finite set partitions and to the enumeration of cycle decompositions of permutations.
The presentation prior……続きを見る
A curated collection of HBR's latest thinking on cybersecurity.
Curates the latest and most important thinking on cybersecurity--a topic that all leaders and managers need to be up to speed and con……続きを見る
著者:Glen D. Singh
出版社: Packt Publishing
発売日: 2019年11月14日
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratch
Key Features
Get up and running with Kali Linux 2019.2
Gain comprehensive insi……続きを見る
出版社: Springer International Publishing
発売日: 2019年07月20日
This book constitutes the refereed and revised post-conference proceedings of the 7th International Workshop on Code-Based Cryptography, CBC 2019, held in Darmstadt, Germany, in May 2019.
The eight ……続きを見る
出版社: Springer International Publishing
発売日: 2019年07月13日
This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full pap……続きを見る
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Hundreds ……続きを見る
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware.
With the aid of numerous case studies and……続きを見る
出版社: Springer International Publishing
発売日: 2019年05月14日
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Technique……続きを見る
Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today’s landscape, organizations need to acqu……続きを見る
Develop a deeper understanding of what's under the hood of blockchain with this technical reference guide on one of the most disruptive modern technologies
Key Features
Updated with four new chapte……続きを見る
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response tea……続きを見る
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the ‘cloud’. The book b……続きを見る
Focusing on the recent proliferation of Wi-Fi in hospital systems, this book explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being imple……続きを見る
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as……続きを見る
Power up your network applications with Python programming
Key Features
Master Python skills to develop powerful network applications
Grasp the fundamentals and functionalities of SDN
Design multi-……続きを見る
Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise……続きを見る
There’s a lot of information about big data technologies, but splicing these technologies into an end-to-end enterprise data platform is a daunting task not widely covered. With this practical book,……続きを見る
A new edition of Shon Harris’ bestselling exam prep guideーfully updated for the new CISSP 2018 Common Body of Knowledge
This effective self-study guide fully prepares you for the challenging CISSP ……続きを見る