eBook
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger for storing all committed transactions in trustless environments by integrating several core technologies such as cryptographic hash, digital signature and distributed consensus mechanisms.
eBook
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity career Key Features: Learn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptography. Explore vulnerability and new logical attacks on the most-used algorithms. Understand the practical implementation of algorithms and protocols in cybersecurity applications
This ebook is an introduction to fundamental concepts in the fields of cryptography and network security. The author takes the reader through all of the important design and implementation details of various cryptographic algorithms and network security protocols to enforce network security.
eBook
Emerging cryptographic technologies offer capabilities such as the ability to process encrypted information without first decrypting it. At the request of the Office of the Director of National Intelligence, this report identifies potential scenarios that would describe the balance between encryption and decryption over the next 10 to 20 years and assesses the national security and intelligence implications of each scenario.
This ebook is a practical guide to the Cybersecurity ABCs, for business and IT leaders looking to enhance security culture in their organizations by improving understanding and practice of cybersecurity at an individual level.
This ebook examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation. Structured along two broad themes and providing empirical examples for how socio-technical changes and political responses interact, the first part of the book looks at the current use of cyberspace in conflictual settings, while the second focuses on political responses by state and non-state actors in an environment defined by uncertainties.
This open access ebook provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved.
eBook
Information security is important in every aspect of daily life. This book examines four areas where risks are present : artificial intelligence (AI), the internet of things (IoT), government and malware. The advantages of using AI in new industries are highlighted in the context of recent developments in mechanical engineering, and a survey of AI software risks is presented focusing on well-publicized failures and US FDA regulatory guidelines.
Search the library catalog
If the full-text is not available online, see our Borrowing & Returns page to learn how the library can help students, faculty and staff to obtain the text (at no cost to you).