著者:Tam Hanna
出版社: entwickler.press
発売日: 2016年02月22日
Sind die eigenen geschäftlichen Daten auf Notebook und Co. verschlüsselt, so startet man sicher ruhiger in den Tag. Beherrscht man die Grundlagen der Kryptografie, ist es gar nicht mal allzu schwer,……続きを見る
Logging beschreibt das Speichern von Prozessen und Datenänderungen in so genannten Logdateien. Dieser shortcut liefert eine Einführung ins Thema Logging. Er zeigt die Wichtigkeit einer engen Koopera……続きを見る
A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
About This Book
Get to grips with the basics of mobile forensics and the various forensic approa……続きを見る
This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model fo……続きを見る
Investigate, analyze, and report iOS, Android, and Windows devices About This Book • Get hands-on experience in performing simple to complex mobile forensics techniques. • Retrieve and analyze data ……続きを見る
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With th……続きを見る
This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the are……続きを見る
Recently inducted into the Cybersecurity Canon Hall of Fame, The CISO Desk Reference Guide, Volumes 1 and 2, are written specifically for CISOs and will become trusted resources for you, your teams,……続きを見る