Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for …
Will your organization be protected the day a quantum computer breaks encryption on the internet?Computer encryption is vital for protecting …
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or …
This book introduces readers to a new and exciting cross-disciplinary field of digital communications with chaos. This field was born …
Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users …
This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is …
Please Read Notes: Brand New, International Softcover Edition, Printed in black and white pages, minor self wear on the cover …
SEC401.1: Network Security Essentials Overview A key way that attackers gain access to a company's resources is through a network …
This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and …
"The Smart Grid is a convenient term to describe the modernization of electric, natural gas, and water grid infrastructures. The …
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and …
In July 1998, a summer school in cryptology and data security was organized atthecomputersciencedepartmentofAarhusUniversity, Denmark.Thistook place as a part of …
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, …
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network …