-
Introduction to Blockchain and Ethereum : use distributed ledgers to validate digital transactions in a decentralized and trustless manner
Electronic funds transfers;Blockchains (Databases);Electronic commerce;Bitcoin;Financial services industry
Castiglione Maldonado, Fatima - Packt Publishing 2018 1st edition
-
Tyranny comes home : the domestic fate of U.S. militarism
Authoritarianism;Civil rights;Militarism;Social control;Diplomatic relations;Military policy;Politics and government;United States;e-böcker
Coyne, Christopher J;Hall, Abigail R - Stanford University Press 2018
-
Lessons Learned : How to protect critical information infrastructure
Data protection;Information resources management;Information superhighway;e-böcker
Viira, Toomas - IT Governance Publishing 2018
-
Attribute-Based Access Control
Computer security;Computers;Computer networks;e-böcker
Hu, Vincent - Artech House 2018
-
Fuzzing for software security testing and quality assurance
Computer networks;Computer security;Computer software;e-böcker
DeMott, Jared;Kettunen, Atte;Miller, Charles;Takanen, Ari - Artech House 2018 Second edition.
-
Decrypted : a financial trader's take on cryptocurrency
Electronic funds transfers;Money;e-böcker
Leng, Hoe Lon - Marshall Cavendish Business 2018
-
Finger Knuckle-Print Authentication Using Fast Discrete Orthonormal Stockwell Transform
Biometric identification;e-böcker
Kumar, N. B. Mahesh;Premalatha, K - Anchor Academic Publishing 2018
-
Practical mobile forensics : a hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
Cell phone systems;Mobile computing;e-böcker
Tamma, Rohit - Packt Publishing 2018 Third edition.
-
Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linux
Penetration testing (Computer security);e-böcker
Najera-Gutierrez, Gilberto;Ansar, Juned Ahmed - Packt Publishing 2018 Third edition.
-
Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers
Penetration testing (Computer security);e-böcker
Chebbi, Chiheb - Packt 2018
-
Mastering Blockchain : distributed ledger technology, decentralization, and smart contracts explained
Bitcoin;Blockchains (Databases);Electronic funds transfers;e-böcker
Bashir, Imran - Packt 2018 Second edition.
-
Security in Computer and Information Sciences : First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers
Data protection;Data encryption (Computer science);Software engineering;Computer Communication Networks;Security;Information Systems Applications (incl. Internet);Cryptology;Special Purpose and Application-Based Systems
Gelenbe, Erol;Campegiani, Paolo;Czachórski, Tadeusz;Katsikas, Sokratis K;Komnios, Ioannis;Romano, Luigi;Tzovaras, Dimitrios - Imprint: Springer 2018 1st ed. 2018.
-
CyberseÌcuriteÌ et RGPD : proteÌgez votre PME : guide pratique pour seÌcuriser votre systeÌme informatique et vous conformer au RGPD
Computer security
Ejzyn, Alain;Berghe, Thierry van den;Nyst, Pierre-FreÌdeÌric - Anthemis 2018
-
Learn ethical hacking from scratch : your stepping stone to penetration testing
Penetration testing (Computer security);Hacking;Computer networks
Sabih, Zaid - Packt 2018 1st edition
-
WIFS : 2017 IEEE Workshop on Information Forensics and Security : 4-7 December 2017
Computer security;Computer crimes;Data encryption (Computer science)
- IEEE 2018
-
Huawei and Snowden Questions : Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?, The
Computer security;Information Systems;Political science;Economic policy;Privacy;Computer Engineering;Management of Computing and Information Systems;Governance and Government;R & D/Technology Policy
Lysne, Olav - Imprint: Springer 2018 1st ed. 2018.
-
Cyber security innovation for the digital economy : a case study of the Russian Federation
Computer security
Petrenko, Sergei - River Publishers 2018
-
Network and Information Systems (NIS) Regulations : a pocket guide for operators of essential services
Computer security
Calder, Alan - IT Governance Publishing 2018
-
Network and Information Systems (NIS) Regulations : a pocket guide for digital service providers
Computer security
Calder, Alan - IT Governance Publishing 2018
-
PKIA 2017 : proceedings : 2017 International Conference on Public Key Infrastructure and its Applications : 14-15 November 2017, The Chancery Pavilion, Bengaluru, India
Computer security;Public key infrastructure (Computer security)
- IEEE 2017