Showing 1-22 of 442 results

Security Mechanisms In Cryptography And Network Security Shopping Deals on 10.04.2020 at TOPPIDUS

  • Computer Security Literacy: Staying Safe in a Digital World

    Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical security topics that users are likely to encounter on a regular basis.Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the fun... [Read More]

    • ASIN: B00AR3DXZY
    • ASIN: B00AR3DXZY
    • Manufacturer: Chapman and Hall/CRC

  • Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures (IEEE Press Series on Information and Communication Networks Security)

    Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications.  Highlights development trends and potential future directions of Information Hiding Introduces a new classification and taxonomy for modern data hiding techniques Presents different types of network steganography mechanisms Introduces several example applications of information hiding in communication networks including some recent covert communication techniques in popular Internet services ... [Read More]

    • ASIN: 1118861698
    • ASIN: 1118861698
    • ISBN: 1118861698
    • Brand: Wiley-IEEE Press
    • Manufacturer: Wiley-IEEE Press

  • HACKING: 2 Books in 1: Beginners Guide and Advanced Tips (Penetration Testing, Basic Security, Password and Network Hacking, Wireless Hacking, Ethical Hacking, Programming Book 3)

    The Most Comprehensive Hacking Guide!Coming Soon - Other Books In This Series- Hacking: Intermediate Level Strategies. Don't miss out!! Subscribe to our email list for valuable newsletters and future book discountsHave you watched the news lately? They can't stop talking about Hacking. It is portrayed in movies, shouted about in media headlines, and typically gets a lot of attention. In fact, in the run up to the 2016 US Presidential election, there were allegations made nearly everyday that the Russians were influencing the election by hacking... [Read More]

    • ASIN: B06W9L2VDY
    • ASIN: B06W9L2VDY

  • Artificial Immune System: Applications in Computer Security

    This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues P... [Read More]

    • ASIN: 1119076285
    • ASIN: 1119076285
    • ISBN: 1119076285
    • Brand: Wiley-IEEE Computer Society Pr
    • Manufacturer: Wiley-IEEE Computer Society Pr

  • Decision and Game Theory for Security: 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings (Lecture Notes in Computer Science Book 11199)

    The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable ... [Read More]

    • ASIN: B07JLXKT8B
    • ASIN: B07JLXKT8B
    • Manufacturer: Springer

  • Integrity Primitives for Secure Information Systems: Final RIPE Report of RACE Integrity Primitives Evaluation (Lecture Notes in Computer Science)

    This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man-month project conducted by 16 leading European security experts.This book offers expert advice to professionals seeking to secure information systems by applying up-to-date cryptographic techniques. The core of this volume is a detailed integrity primitives portfolio recommendation. Among the issues addressed are security services, integrity mechanisms, data origin authentication, entity authenti... [Read More]

    • ASIN: 3540606408
    • ASIN: 3540606408
    • ISBN: 3540606408
    • Manufacturer: Springer

  • Encryption for Digital Content (Advances in Information Security Book 52)

    Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel  fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques... [Read More]

    • ASIN: B00FBQ2XVW
    • ASIN: B00FBQ2XVW
    • Manufacturer: Springer

  • Security Mechanisms ll Information and Cyber Security Course Explained in Hindi

    Security Mechanisms In Cryptography And Network Security

    Security Mechanisms in Cryptography

    Security Mechanisms In Cryptography And Network Security
    Security Mechanisms in Cryptography,#abhics789,abhics789,Cryptography and network security

    NETWORK SECURITY-6| SECURITY MECHANISM

    Security Mechanisms In Cryptography And Network Security
    SECURITY MECHANISM