1-10
of
1,512
results
-
Applied Cryptography for Cyber...In today s information age the security of digital communication and transacti... In today s information age the security of digital communication and transactions is of critical importance. Cryptography is the traditional yet effective practice of concealing personal information in cyberspace. Applied Cryptography for Cyber... more
-
Iconic Arts Laminated 24x24 in...Iconic Arts Laminated 24x24 inches Poster: Cyber Security Internet Hacker Netw... Iconic Arts Laminated 24x24 inches Poster: Cyber Security Internet Hacker Network Technology Secure Protect Access Spyware Privacy Hacking Protection Cyber Security Cyber Crime. HIGH QUALITY ART PRINT is ready-to-frame or can be hung on the wall... more
-
Handbook of Research on Machin...As the advancement of technology continues cyber security continues to play a ... As the advancement of technology continues cyber security continues to play a significant role in today s world. With society becoming more dependent on the internet new opportunities for virtual attacks can lead to the exposure of critical... more
-
Advances in Information Securi...Motivation for the Book This book seeks to establish the state of the art in t... Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security cognitive science and... more
-
Pre-Owned Digital Security: Cy...Good Condition: Minimal damage to the cover dust jacket may not be included mi... Good Condition: Minimal damage to the cover dust jacket may not be included minimal wear to binding most of the pages undamaged(e.g. minimal creases or tears) highlighting / underlining acceptable on books as long as the text is readable and... more
-
Advanced Sciences and Technolo...Deals with collaborative security a newly developing and promising field. Desc... Deals with collaborative security a newly developing and promising field. Describes generic techniques as well as their applications in several domains that are naturally described as cyber-physical systems Contributes to identifing relevant... more
-
Cyber Security Cyber Crime and...Recent developments in cyber security crime and forensics have attracted resea... Recent developments in cyber security crime and forensics have attracted researcher and practitioner interests from technological organizational and policy-making perspectives. Technological advances address challenges in information sharing... more
-
Children Cyber Behavior and Cy...This book is written keeping in mind the majority of parents who may not be te... This book is written keeping in mind the majority of parents who may not be technical savvy and may need awareness as well as easy tips to handle the current children cyber behavior. We have included actual images to visualize and understand the... more
-
Chapman & Hall/CRC Cryptograph...Helping current and future system designers take a more productive approach in... Helping current and future system designers take a more productive approach in the field Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and... more
-
Information Security and Crypt...Security protocols are widely used to ensure secure communications over insecu... Security protocols are widely used to ensure secure communications over insecure networks such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However using... more
Ads related to cyber security cryptography research
Shopping for the best deal on Cyber security cryptography research Computer Books - Select a product below or see other matches to read product reviews, compare prices and store ratings.