1-20
of
241
results
-
Pre-Owned The Physics of Quant...It s a preowned item in good condition and includes all the pages. It may have... It s a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear such as markings highlighting slight damage to the cover minimal wear to the binding etc. but they will not affect the overall reading... more
-
The Physics of Quantum Informa...Information is stored transmitted and processed by physical means. Thus the co... Information is stored transmitted and processed by physical means. Thus the concept of information and computation can be formulated in the con- text of a physical theory and the study of information requires ultimately experimentation. This... more
-
Quantum Computing Quantum-Safe...Quantum computers have demonstrated that they have the inherent potential to o... Quantum computers have demonstrated that they have the inherent potential to outperform classical computers in many areas. One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum... more
-
Quantum Security Simplified: S...âš¡ Step into the future of security. This book unveils the revolutionary impa... âš¡ Step into the future of security. This book unveils the revolutionary impact of quantum computing on the digital world and shows how businesses leaders and professionals can safeguard their future with clarity confidence and practical steps. more
-
Cryptography Algorithms: A gui...Build your real-world cryptography knowledge from understanding the fundamenta... Build your real-world cryptography knowledge from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity career Key Features: Learn modern algorithms such as zero-knowledge elliptic... more
-
Information Security and Crypt...There are three fundamental components in Control-Flow Integrity (CFI) enforce... There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually the more precise the policy is the more security CFI improves but precise CFG generation was... more
-
Quantum Science and Technology...Quantum Cryptography: From Key Distribution to Conference Key Agreement Quantum Cryptography: From Key Distribution to Conference Key Agreement more
-
Quantum-Safe Cryptography: Pro...Quantum-Safe Cryptography: Protecting Data in a Quantum World addresses the im... Quantum-Safe Cryptography: Protecting Data in a Quantum World addresses the impending challenges posed by quantum computing to current cryptographic systems. As quantum technology progresses the potential to compromise classical encryption methods... more
-
Post-Quantum Security Engineer...Most books about cryptography quietly assume you still have time. This one doe... Most books about cryptography quietly assume you still have time. This one doesn t. We are entering a moment where the mathematical foundations behind digital trust-RSA and ECC-are no longer safe assumptions but time-limited dependencies. Every... more
-
Physical-Layer Security Quantu...The growth of data-driven technologies 5G and the Internet place enormous pres... The growth of data-driven technologies 5G and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However the security of both optical and... more
-
Becoming Quantum Safe: Protect...A practical guide to navigating cryptographic challenges in the era of quantum... A practical guide to navigating cryptographic challenges in the era of quantum computing. Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your Business is a is a definitive pragmatic guide designed for... more
-
Books on Tech Post-quantum Cry...A must-read for researchers professionals and anybody else interested in cyber... A must-read for researchers professionals and anybody else interested in cybersecurity in the era of quantum computing is Postquantum Cryptography: Defending Against Quantum Threats. Traditional cryptography techniques could be vulnerable as quantum... more
-
Quantum Information Theory: Th...Quantum information theory is a generalization of classical information theory... Quantum information theory is a generalization of classical information theory to use quantum-mechanical particles and interference. It is used in the study of quantum computation and quantum cryptography. more
-
The Quantum-Ready Architect: B...Quantum computers aren t here to ruin your week... yet. But the cryptography p... Quantum computers aren t here to ruin your week... yet. But the cryptography protecting today s internet? A lot of it comes with an expiration date. If you build or run modern systems post-quantum cryptography (PQC) isn t a future problem. It s a... more
-
Physical-Layer Security Quantu...This book introduces the reader to the most advanced topics of physical-layer ... This book introduces the reader to the most advanced topics of physical-layer security (PLS) cryptography covert/stealth communications and quantum key distribution (QKD) also known as the quantum cryptography and post-quantum cryptography (PQC). So... more
-
Introduction to Quantum Comput...Unlock the power of quantum computing and explore the cutting-edge of technolo... Unlock the power of quantum computing and explore the cutting-edge of technology with Introduction to Quantum Computing: Code the Future. Dive into the revolutionary world where bits transform into qubits offering unparalleled processing... more
-
Vector Database Systems Engine...Vector Database Systems Engineering is an advanced practical guide to building... Vector Database Systems Engineering is an advanced practical guide to building intelligent scalable and high-performance vector-native architectures for modern AI applications this book explores the core principles engineering patterns and... more
-
Vector Databases for AI Applic...Vector Databases for AI Applications: Build Semantic Search RAG Systems and Hi... Vector Databases for AI Applications: Build Semantic Search RAG Systems and High-Performance Embedding Pipelines for Intelligent Applications Modern AI applications are no longer built on keywords alone-they rely on meaning context and intelligent... more
-
PostgreSQL 18 for Automated AI...Unlock the full potential of your AI systems without the complexity of fragmen... Unlock the full potential of your AI systems without the complexity of fragmented tools. PostgreSQL 18 for Automated AI Pipelines is a hands-on production-focused guide that shows you how to build scalable secure and fully automated AI data... more
-
System Designs with Vector Dat...What if you could build AI-driven systems that deliver lightning-fast recommen... What if you could build AI-driven systems that deliver lightning-fast recommendations secure sensitive data and scale effortlessly under massive workloads? Imagine transforming raw data into actionable insights with precision and efficiency. System... more
Ads related to vector embedding quantum cryptography