Computer Security category: 2451 books

Cover of Adversarial Machine Learning
by Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman
Language: English
Release Date: August 8, 2018

The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine learning into a major tool employed across a broad array of tasks including vision, language, finance, and security. However, success has been accompanied...
Cover of Blockchain and the Law

Blockchain and the Law

The Rule of Code

by Primavera De Filippi De Filippi
Language: English
Release Date: April 9, 2018

Since Bitcoin appeared in 2009, the digital currency has been hailed as an Internet marvel and decried as the preferred transaction vehicle for all manner of criminals. It has left nearly everyone without a computer science degree confused: Just how do you “mine” money from ones and zeros? The...
Cover of Penetration Testing Bootcamp
by Jason Beltrame
Language: English
Release Date: June 30, 2017

Sharpen your pentesting skill in a bootcamp About This Book Get practical demonstrations with in-depth explanations of complex security-related problems Familiarize yourself with the most common web vulnerabilities Get step-by-step guidance on managing testing results and reporting Who This...
Cover of Progress in Cryptology - LATINCRYPT 2014

Progress in Cryptology - LATINCRYPT 2014

Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papers

by
Language: English
Release Date: March 28, 2015

This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianópolis, Brazil, in September 2014. The 19 papers presented together with four invited talks were carefully reviewed and selected from...
Cover of Securing Government Information and Data in Developing Countries
by
Language: English
Release Date: February 27, 2017

The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and...
Cover of Empirical Research for Software Security

Empirical Research for Software Security

Foundations and Experience

by
Language: English
Release Date: November 28, 2017

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations...
Cover of Privacy and Anonymity in Information Management Systems

Privacy and Anonymity in Information Management Systems

New Techniques for New Practical Problems

by
Language: English
Release Date: July 16, 2010

As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became...
Cover of Trustworthy Execution on Mobile Devices
by Amit Vasudevan, Jonathan M. McCune, James Newsome
Language: English
Release Date: August 13, 2013

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives,...
Cover of Visual Cryptography and Secret Image Sharing
by
Language: English
Release Date: December 19, 2017

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete...
Cover of E-Business and Telecommunications

E-Business and Telecommunications

International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers

by
Language: English
Release Date: September 27, 2014

This book constitutes the refereed proceedings of the 10th International Joint Conference on E-Business and Telecommunications, ICETE 2013, held in Reykjavik, Iceland, in July 2013. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding...
Cover of Advances in Cryptology – ASIACRYPT 2018

Advances in Cryptology – ASIACRYPT 2018

24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II

by
Language: English
Release Date: November 22, 2018

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were...
Cover of Autonomous Cyber Deception

Autonomous Cyber Deception

Reasoning, Adaptive Planning, and Evaluation of HoneyThings

by
Language: English
Release Date: January 2, 2019

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception.  An important distinguishing characteristic...
Cover of Mobile Cloud Computing

Mobile Cloud Computing

Foundations and Service Models

by Dijiang Huang, Huijun Wu
Language: English
Release Date: September 8, 2017

Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on...
Cover of Introduction to Certificateless Cryptography
by Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Language: English
Release Date: September 19, 2016

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have...
First 92 93 94 95 96 97 9899 100
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy