This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, “Hybrid Encryption Algorithms over Wireless Communication Channels”, examines encryp……続きを見る
Every year, datacenter managers must deliver more services faster, with greater flexibility. They must efficiently handle soaring amounts of data, and unprecedented levels of complexity. And they mu……続きを見る
Presenting a balance of theory and practice, this up-to-date guide provides a comprehensive overview of the key issues in telecommunication network economics, as well as the mathematical models behi……続きを見る
Akamai’s globally distributed Intelligent Platform™ allows us to gather massive amounts of data on many metrics including Internet connection speeds, network connectivity/availability issues, and IP……続きを見る
This book explores the use of Lightweight Directory Access Protocol (LDAP) as an efficient protocol. It combines all of the relevant information available on the Internet along with a number of argu……続きを見る
This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024, held in Gardanne, France, during April 9–10, 2……続きを見る
Akamai’s globally distributed Intelligent Platform allows us to gather massive amounts of data on many metrics, including connection speeds, attack traffic, network connectivity/availability issues,……続きを見る
Akamai’s globally distributed Intelligent Platform™ allows us to
gather massive amounts of data on many metrics including Internet
connection speeds, network connectivity/availability issues, and
IP……続きを見る
著者:Eric Maiwald
出版社: McGraw Hill LLC
発売日: 2012年10月06日
Security Smarts for the Self-Guided IT Professional
Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with m……続きを見る
Introduce yourself to the nuances of modern monitoring for cloud-native applications running on Kubernetes clusters. This book will help you get started with the concepts of monitoring, introduce yo……続きを見る
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significant……続きを見る
This book discusses the pros and cons of information and communication (ICT) neutrality. It tries to be as objective as possible from arguments of proponents and opponents, this way enabling readers……続きを見る
Internet a bouleversé nos habitudes et nos modes de vie. Et si la révolution numérique n’en était qu’à ses débuts ? Et si, demain, nos achats en ligne, nos interactions sociales et nos loisirs s’ins……続きを見る