Secure Multiparty Computation and Secret ...
12,071円 In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally sec...
Accumulo
3,617円 Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, applicat...
The DIY Guide to Home Wi-Fi
1,128円 We’ve all been there before. The red x on the lower right side of the computer screen. No Internet connection. The first thing you do is click it try to reconnect and nothing. You then, for some odd reason yell out “Is ANYONE ELSE having Internet issues?” “YEAH” you hear replied. You run down to ...
Agile Information Security
1,657円 In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will fin...
Cloud Storage Security
4,225円 Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provi...
Cryptography and Information Security in ...
5,834円 This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 subm...
Financial Cryptography and Data Security
6,076円 This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed ...
Constructive Side-Channel Analysis and Se...
6,076円 This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop, COSADE 2015, held in Berlin, Germany, in April 2015. The 17 revised full papers presented were carefully selected from 48 submissions. the focus of this workshop was on following topics: s...
Leveraging Consumer Psychology for Effect...
10,446円 This timely book brings together some of the most higly respected scholars and practitioners in the consumer psychology and health communication fields to analyze how the latest research can be effectively applied to the critical public health issue of obesity.
Information Security A Practical Guide
5,040円 Provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole.
Two-Factor Authentication
2,652円 This book discusses the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will be provided with insight about the reasons that two...
楽天Koboの電子書籍!マンガ、小説、雑誌のレビュー高評価、最安値をチャック!