80 resultater (0,34753 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

Nondestructive Testing - - Bog - Nova Science Publishers Inc - Plusbog.dk

Genetic Testing - Michele Schoonmaker - Bog - Nova Science Publishers Inc - Booktok.dk

Cluster Effects in Mining Complex Data - M Ishaq Bhati - Bog - Nova Science Publishers Inc - Plusbog.dk

A Comprehensive Guide to Genetic Counseling - - Bog - Nova Science Publishers Inc - Booktok.dk

Ballistic Resistance of Body Armor - Nova Science - Bog - Nova Science Publishers Inc - Plusbog.dk

Education Law & Legislation - - Bog - Nova Science Publishers Inc - Plusbog.dk

Structure & Succession of Fouling Communities - V V Khalaman - Bog - Nova Science Publishers Inc - Plusbog.dk

A Closer Look at Cybersecurity and Cryptanalysis - - Bog - Nova Science Publishers Inc - Plusbog.dk

A Closer Look at Cybersecurity and Cryptanalysis - - Bog - Nova Science Publishers Inc - Plusbog.dk

A major concern in today's digital world is Security. Due to digitization, implementation of secure policies and procedures to ensure security became challenging issue. Also analyzing the strength of security algorithms or procedures is more important to avoid compromising of organizational assets. In this direction, this book explains the role of cryptanalysis in real world with practical examples. Cryptanalysis of various algorithms by using emerging technologies is explained which is helpful for reader/learner to implement innovative cryptanalysis schemes that assists to evaluate the existing cryptographic algorithms. This book also demonstrated different ways of evaluating the security of the system in the form of penetration testing. Tools for performing penetration testing is well illustrated with stepwise procedure which will give hands-on experience to the reader/audience. The role of data mining schemes in the context of intrusion detection system (IDS) is also illustrated. This book enlighten the use of IoT based security application in solving the social issues. Such demonstrated applications in this book will help readers/audiences to implement their own novel applications for addressing different societal issues. We consider all aforementioned features as the strength of this book. With this impression we ensures that all undergraduate and postgraduate students of any discipline will get a basic idea on cryptography, cryptanalysis, penetration testing tools, cyber security, IDS and IoT applications in securing today's digitalized world.

DKK 757.00
2

Behavioral Study of Agonist-Evoked Activation of Transient Receptor Potential Channels - Merab G. Tsagareli - Bog - Nova Science Publishers Inc -

Focus on Educational Research - Brandon Hernandez - Bog - Nova Science Publishers Inc - Plusbog.dk

Non-Nested Regression Models - - Bog - Nova Science Publishers Inc - Plusbog.dk

Vehicle-to-Vehicle Technologies for Intelligent Transportation Systems - - Bog - Nova Science Publishers Inc - Plusbog.dk

Surgical Simulation & Training - - Bog - Nova Science Publishers Inc - Plusbog.dk

Practical Guide to Reflux - - Bog - Nova Science Publishers Inc - Plusbog.dk