Filter
Datakryptering
Filter
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic …
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and to decrypt intercepted German diplomatic and military …
Explore expert strategies to master cyber resilience as a CISO, ensuring your organization's security program stands strong against evolving threats Key Features Unlock expert …
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic …
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, …
This book presents state-of-the-art blockchain and AI advances in health care. Healthcare service is increasingly creating the scope for blockchain and AI applications to enter the …
Master the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steuart's GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, 7th Edition. Combining the …
Learn how to implement, deploy, and manage blockchain solutions across AWS, Azure, and GCP with the help of hands-on labs and real-world use cases Key Features Learn architecture …
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic …
The book aims to present a multi-dimensional view on the blockchain-driven supply chain management and its linkage with open innovation, digital technologies, supply chain …