This book offers a thorough overview of permissioned blockchain systems, emphasizing how they can tackle key challenges in large-scale transaction management systems. Modern transaction systems oper……続きを見る
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby cras……続きを見る
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment
In Open-Source Security Operations Center (SOC): A Complete Guide t……続きを見る
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law - the law affecting information and communication technology (ICT) - in the Bangladesh c……続きを見る
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-base……続きを見る
This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that……続きを見る
Modern internet-enabled devices and fast communication technologies have ushered in a revolution in sharing of digital images and video. This may be for social reasons or for commercial and industri……続きを見る
This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart ……続きを見る
This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to ……続きを見る
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system ……続きを見る
This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational dat……続きを見る
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that an……続きを見る