Wir konnten keine exakten Treffer zu Ihrer Suche nach "Security and Communications" finden. Könnten diese Produkte zu Ihrer Suche passen?

Ansicht:
: Security and Privacy in Communication Networks, Buch

Security and Privacy in Communication Networks

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering -Band 568

This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023…

lieferbar innerhalb 2-3 Wochen
Buch
EUR 98,56*
: Security and Privacy in Communication Networks, Buch

Security and Privacy in Communication Networks

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering -Band 567

This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023…

lieferbar innerhalb 2-3 Wochen
Buch
EUR 98,56*
: Innovative Security Solutions for Information Technology and Communications, Buch

Innovative Security Solutions for Information Technology and Communications

Lecture Notes in Computer Science -Band 14534

This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Commu…

lieferbar innerhalb 2-3 Wochen
Buch
EUR 63,51*
Lev Topor: Cyber Sovereignty, Buch

Lev Topor
Cyber Sovereignty

Global Power Shift

The internet has become a battleground for global power struggles, with nations and even terrorist organizations wielding cyber-attacks to exert control. As the absence of binding international laws and n…

lieferbar innerhalb 2-3 Wochen
Buch
EUR 120,46*
Alex Cushman: Computer Networks, Buch

Alex Cushman, Ata Elahi
Computer Networks

The hands-on textbook covers both the theory and applications of data communications, the Internet, and network security technology, following the ACM guideline for courses in networking. The content is g…

lieferbar innerhalb 2-3 Wochen
Buch
EUR 85,33*
Yulong Shen: Secrecy, Covertness and Authentication in Wireless Communications, Buch

Yulong Shen, Xiaohong Jiang, Yuanyu Zhang
Secrecy, Covertness and Authentication in Wireless Communications

Wireless Networks

This book introduces the fundamentals of physical layer security (PLS) and demonstrates how a variety of PLS techniques can be applied to improve the security of wireless communication systems. In particu…

lieferbar innerhalb 2-3 Wochen
Buch
EUR 197,13*
: National Security Drivers of Ukraine, Buch

National Security Drivers of Ukraine

Contributions to Political Science

This volume presents the key informational, communication, and socio-political drivers of the Ukrainian state's national security. Since the beginning of the third millennium, there has been an aggravatio…

lieferbar innerhalb 2-3 Wochen
Buch
EUR 142,37*
Javier Hernandez Fernandez: Physical Layer Security in Power Line Communications, Buch

Javier Hernandez Fernandez, Roberto Di Pietro, Aymen Omri
Physical Layer Security in Power Line Communications

Advances in Information Security -Band 108

This book emerges as a seminal work, addressing the critical need for robust security for power line communications (PLC), during an era where digital interconnectivity is paramount yet vulnerable. This c…

lieferbar innerhalb 2-3 Wochen
Buch
EUR 175,23*
: Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs, Buch

Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs

Advanced Sciences and Technologies for Security Applications

This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their know…

lieferbar innerhalb 2-3 Wochen
Buch
EUR 164,28*
Adam Tilmar Jakobsen: Practical Cyber Intelligence, Buch

Adam Tilmar Jakobsen
Practical Cyber Intelligence

Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process Practical Cyber Intelligence provides a thorough and practical introduction to …

lieferbar innerhalb 1-2 Wochen
Buch
EUR 126,93*
Chris Jay Hoofnagle: Cybersecurity in Context, Buch

Chris Jay Hoofnagle, Golden G Richard
Cybersecurity in Context

"A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 116,83*
: Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection, Buch

Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection

Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial intelligence (AI) and machine learning (ML) Applying Artificial I…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 161,03*
Perry Carpenter: Faik, Buch

Perry Carpenter
Faik

PRAISE FOR FAIK AND PERRY CARPENTER "If you want to understand emerging threats, you want to hear what Perry has to say." --TED HARRINGTON, #1 bestselling author, leader of hackers, co-founder of IoT Vil…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 30,90*
Paul J Maurer: The Code of Honor, Buch

Paul J Maurer, Ed Skoudis
The Code of Honor

Many professions--including medicine, law, and engineering--have long required their practitioners to embrace and abide by an overarching code of ethics and conduct. Cybersecurity, possibly due to its mor…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 41,38*
Mark Buckwell: Security Architecture for Hybrid Cloud, Buch

Mark Buckwell, Stefaan van Daele, Carsten Horst
Security Architecture for Hybrid Cloud

As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to delive…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 58,32*
Karl Ots: Securing Microsoft Azure OpenAI, Buch

Karl Ots
Securing Microsoft Azure OpenAI

Unlock the power of AI while ensuring your data security and customer privacy In Securing Microsoft Azure OpenAI, author Karl Ots delivers an essential guide to harnessing the vast AI capabilities of Micr…

lieferbar ab 29.1.2025.
Buch
EUR 71,36*
: Autonomous Cyber Resilience, Buch

Autonomous Cyber Resilience

Authoritative and highly comprehensive resource on the latest research and strategies to develop cyber resilience in any network system Autonomous Cyber Resilience presents key research contributions in t…

lieferbar ab 13.5.2025.
Buch
EUR 155,97*
Elonka Dunin: Codebreaking: A Practical Guide, Buch

Elonka Dunin, Klaus Schmeh
Codebreaking: A Practical Guide

"Teaches how to break encrypted texts, whether by hand or using free computer tools. Covers specific cryptographic techniques and includes real-life examples of encrypted text, from modern postcards to ni…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 29,92*
Brandon Carroll: Securing the AWS Cloud, Buch

Brandon Carroll
Securing the AWS Cloud

Make your next Amazon Web Services deployment secure and private Dive into the world of cloud security with Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure by Brandon Carroll, a…

lieferbar ab 5.3.2025.
Buch
EUR 70,10*
Joseph Hoy: Forensic Radio Survey Techniques for Cell Site Analysis, Buch

Joseph Hoy
Forensic Radio Survey Techniques for Cell Site Analysis

Overview of the end-to-end process of planning, undertaking, and reporting of forensic radio surveying to support cell site analysis The newly updated and revised Second Edition of Forensic Radio Survey T…

lieferbar innerhalb 1-2 Wochen
Buch
EUR 192,59*
Informationen zur Lieferbarkeit bzw. zu Veröffentlichungsterminen von Artikeln beruhen auf Vorabinformationen unserer Lieferanten. Diese Termine sind ohne Gewähr und können sich jederzeit ändern.