Networking Communications category: 4555 books

Cover of Quantum Attacks on Public-Key Cryptosystems
by Song Y. Yan
Language: English
Release Date: July 8, 2014

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on...
Cover of Broadband Wireless Access Networks for 4G

Broadband Wireless Access Networks for 4G

Theory, Application, and Experimentation

by
Language: English
Release Date: December 31, 2013

With the increased functionality demand for mobile speed and access in our everyday lives, broadband wireless networks have emerged as the solution in providing high data rate communications systems to meet these growing needs. Broadband Wireless Access Networks for 4G: Theory, Application, and Experimentation...
Cover of Information Hiding in Speech Signals for Secure Communication
by Zhijun Wu
Language: English
Release Date: August 27, 2014

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret...
Cover of Code Breaking in the Pacific
by Peter Donovan, John Mack
Language: English
Release Date: August 14, 2014

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25)...
Cover of Wireless Rechargeable Sensor Networks
by Yuanyuan Yang, Cong Wang
Language: English
Release Date: April 20, 2015

This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from...
Cover of Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction
by
Language: English
Release Date: February 9, 2018

As the world becomes digitalized, developing countries are starting to see an increase in technological advancements being integrated into their society. These advancements are creating opportunities to improve both the economy and the lives of people within these areas. Affordability Issues Surrounding...
Cover of Tablet PC Telephone
by Robert Stetson
Language: English
Release Date: November 9, 2013

When your Tablet PC manufacturer indicates in the specification that the device is not capable of supporting cell phone connectivity, you probably dismissed using it for making phone calls.You can save on your cell phone minutes by using your Tablet PC even if the Tablet does not support cell phone...
Cover of Programmatic Integration of Cyber into the Institutional Domain of Leader Development: Cyberspace and Computer Curriculum in Army Learning Institutions, Comparing Cyber to Armor or Aviation
by Progressive Management
Language: English
Release Date: May 12, 2018

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This study assesses the institutional domain of leader development in relation to cyberspace education and the implications of poorly integrating cyberspace into leader development....
Cover of Data Breach Preparation and Response

Data Breach Preparation and Response

Breaches are Certain, Impact is Not

by Kevvie Fowler
Language: English
Release Date: June 8, 2016

Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry...
Cover of Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings

by
Language: English
Release Date: April 24, 2018

This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber...
Cover of Proceedings of the 2nd Workshop on Communication Security

Proceedings of the 2nd Workshop on Communication Security

Cryptography and Physical Layer Security

by
Language: English
Release Date: July 11, 2017

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge...
Cover of Mobile Computing and Wireless Networks

Mobile Computing and Wireless Networks

Concepts, Methodologies, Tools, and Applications

by
Language: English
Release Date: September 30, 2015

We live in a wireless society, one where convenience and accessibility determine the efficacy of the latest electronic gadgets and mobile devices. Making the most of these technologies—and ensuring their security against potential attackers—requires increased diligence in mobile technology research...
Cover of Advanced Multimedia and Ubiquitous Engineering
by
Language: English
Release Date: May 11, 2017

This book presents the proceedings of the 11th International Conference on Multimedia and Ubiquitous Engineering (MUE2017) and the 12th International Conference on Future Information Technology (FutureTech2017), held in Seoul, South Korea on May 22–24, 2017. These two conferences provided...
Cover of Cyberterrorism After Stuxnet - Terrorist Cyberattacks, Distributed Denial of Service (DDoS), Motives, Critical U.S. Infrastructure Vulnerabilities, al-Qaeda Computer Capability, PC Attacks
by Progressive Management
Language: English
Release Date: January 11, 2015

Public government statements have cited cyber-attacks by terrorists as a major concern for national security. To date, no large-scale cyber-terrorist attack has been observed, but terrorists are known to be using the Internet for various routine purposes. The discovery of Stuxnet in 2010 was a milestone...
First 58 59 60 61 62 63 6465 66 67 68 69 70 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy