In July 1998, a summer school in cryptology and data security was organized atthecomputersciencedepartmentofAarhusUniversity, Denmark.Thistook place as a part of …
The Chief Java Security Architect at Sun Microsystems, where Java comes from, provides a detailed look at the central workings …
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, …
Carve out your niche in the exploding world of blockchain technology Cryptocurrency, NFTs, smart contracts, and ever-more-important business and finance …
Securing the Chain: Navigating the Future of Blockchain with Confidence KEY FEATURES ● Discover the forefront of blockchain security protocols …
Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority …
Become a Blockchain developer and design, build, publish, test, maintain and secure scalable decentralized Blockchain projects using Bitcoin, Ethereum, NEO, …
Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, …
The international relations of the Persian Gulf have long been dominated by power politics. Its unrivalled energy resources have historically …
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing …
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area …
This book constitutes the thoroughly refereed post-conferenceproceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues …
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and …
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice …
This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice …
The Common Security and Defence Policy maps out how the EU - established primarily to be an economic organisation - …
Understanding NATO in the 21st Century enhances existing strategic debates and clarifies thinking as to the direction and scope of …
Big Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, trends …
Step by step guide to monitor, manage, and secure your database engine Key Features Your companion to master all the …
This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for …
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network …
Learn how to implement multi-layered security controls to protect against rapidly evolving threats to Azure environmentsKey FeaturesDevelop practical skills to …
The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine …
Adversarial Robustness for Machine Learning summarizes the recent progress on this topic and introduces popular algorithms on adversarial attack, defense …
An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is …
Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores …
In Future Jihad, terrorism and Middle East expert Walid Phares gave a definitive account of the historical and cultural forces …
Accidents and natural disasters involving nuclear power plants such as Chernobyl, Three Mile Island, and the recent meltdown at Fukushima …
This book provides a detailed analysis of the complicated relations between Iran and its Arab neighbours. Arab perceptions of Iran, …
Iran's nuclear program is one of this century's principal foreign policy challenges. Despite U.S., Israeli, and allied efforts, Iran has …