|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This timely book is an innovative look at how blockchain technology
will transform the structure of social and economic life. The
security of blockchain supports the provision and maintenance of
reliable databases and the creation of rule-based governance
protocols. Leading contributors expertly review the impact of
blockchain on existing structures of law, monetary systems, supply
chains and business organizations. Using economic and institutional
theory, the book presents a vision for understanding the future
development of blockchain technology and outlines the likely path
of transformation that blockchain will drive in industry, supply
chains and firms. Furthermore, it answers key questions such as:
will Bitcoin or another cryptocurrency become the money of the
future? How has blockchain already begun transforming economic
activity? How can we evaluate the likely trajectory of
technological development and application? This informative book is
an excellent resource for academics or professionals interested in
a theoretically sound perspective on blockchain. Written in an
accessible prose, it provides an introduction for non-experts
looking to learn more about the wide-ranging implications of
blockchain and cryptocurrency.
This compendium focuses on self-contained presentations of various
developments in mathematical analysis, cryptography and information
science.The volume features both original research and survey
papers contributed by experts from the international community. The
book has a strong interdisciplinary flavor and features the most
recent developments in the topics treated.This useful reference
text benefits professionals, researchers, academics and graduate
students.
 |
TLS Mastery
(Hardcover)
Michael W Lucas
|
R970
R875
Discovery Miles 8 750
Save R95 (10%)
|
Ships in 10 - 15 working days
|
|
Learn application security from the very start, with this
comprehensive and approachable guide! Alice and Bob Learn
Application Security is an accessible and thorough resource for
anyone seeking to incorporate, from the beginning of the System
Development Life Cycle, best security practices in software
development. This book covers all the basic subjects such as threat
modeling and security testing, but also dives deep into more
complex and advanced topics for securing modern software systems
and architectures. Throughout, the book offers analogies, stories
of the characters Alice and Bob, real-life examples, technical
explanations and diagrams to ensure maximum clarity of the many
abstract and complicated subjects. Topics include: Secure
requirements, design, coding, and deployment Security Testing (all
forms) Common Pitfalls Application Security Programs Securing
Modern Applications Software Developer Security Hygiene Alice and
Bob Learn Application Security is perfect for aspiring application
security engineers and practicing software developers, as well as
software project managers, penetration testers, and chief
information security officers who seek to build or improve their
application security programs. Alice and Bob Learn Application
Security illustrates all the included concepts with
easy-to-understand examples and concrete practical applications,
furthering the reader's ability to grasp and retain the
foundational and advanced topics contained within.
The rapid advancements in telecommunications, computing hardware
and software, and data encryption, and the widespread use of
electronic data processing and electronic business conducted
through the Internet have led to a strong increase in information
security threats. The latest advances in information security have
increased practical deployments and scalability across a wide range
of applications to better secure and protect our information
systems and the information stored, processed and transmitted. This
book outlines key emerging trends in information security from the
foundations and technologies in biometrics, cybersecurity, and big
data security to applications in hardware and embedded systems
security, computer forensics, the Internet of Things security, and
network security. Information Security: Foundations, technologies
and applications is a comprehensive review of cutting-edge
algorithms, technologies, and applications, and provides new
insights into a range of fundamentally important topics in the
field. This up-to-date body of knowledge is essential reading for
researchers and advanced students in information security, and for
professionals in sectors where information security is required.
This book summarizes recent inventions, provides guidelines and
recommendations, and demonstrates many practical applications of
homomorphic encryption. This collection of papers represents the
combined wisdom of the community of leading experts on Homomorphic
Encryption. In the past 3 years, a global community consisting of
researchers in academia, industry, and government, has been working
closely to standardize homomorphic encryption. This is the first
publication of whitepapers created by these experts that
comprehensively describes the scientific inventions, presents a
concrete security analysis, and broadly discusses applicable use
scenarios and markets. This book also features a collection of
privacy-preserving machine learning applications powered by
homomorphic encryption designed by groups of top graduate students
worldwide at the Private AI Bootcamp hosted by Microsoft Research.
The volume aims to connect non-expert readers with this important
new cryptographic technology in an accessible and actionable way.
Readers who have heard good things about homomorphic encryption but
are not familiar with the details will find this book full of
inspiration. Readers who have preconceived biases based on
out-of-date knowledge will see the recent progress made by
industrial and academic pioneers on optimizing and standardizing
this technology. A clear picture of how homomorphic encryption
works, how to use it to solve real-world problems, and how to
efficiently strengthen privacy protection, will naturally become
clear.
This book provides comprehensive coverage of various Cryptography
topics, while highlighting the most recent trends such as quantum,
blockchain, lightweight, Chaotic and DNA cryptography. Moreover,
this book covers cryptography primitives and its usage and
applications and focuses on the fundamental principles of modern
cryptography such as Stream Ciphers, block ciphers, public key
algorithms and digital signatures. Readers will gain a solid
foundation in cryptography and security. This book presents the
fundamental mathematical concepts of cryptography. Moreover, this
book presents hiding data techniques such as steganography and
watermarking. The author also provides a comparative study of the
different cryptographic methods, which can be used to solve
security problems.
This eighteenth volume in the Poincare Seminar Series provides a
thorough description of Information Theory and some of its most
active areas, in particular, its relation to thermodynamics at the
nanoscale and the Maxwell Demon, and the emergence of quantum
computation and of its counterpart, quantum verification. It also
includes two introductory tutorials, one on the fundamental
relation between thermodynamics and information theory, and a
primer on Shannon's entropy and information theory. The book offers
a unique and manifold perspective on recent mathematical and
physical developments in this field.
 |
Advances in Production Management Systems. Towards Smart and Digital Manufacturing
- IFIP WG 5.7 International Conference, APMS 2020, Novi Sad, Serbia, August 30 - September 3, 2020, Proceedings, Part II
(Hardcover, 1st ed. 2020)
Bojan Lalic, Vidosav Majstorovic, Ugljesa Marjanovic, Gregor von Cieminski, David Romero
|
R3,052
Discovery Miles 30 520
|
Ships in 10 - 15 working days
|
|
The two-volume set IFIP AICT 591 and 592 constitutes the refereed
proceedings of the International IFIP WG 5.7 Conference on Advances
in Production Management Systems, APMS 2020, held in Novi Sad,
Serbia, in August/September 2020. The 164 papers presented were
carefully reviewed and selected from 199 submissions. They discuss
globally pressing issues in smart manufacturing, operations
management, supply chain management, and Industry 4.0. The papers
are organized in the following topical sections: Part I: advanced
modelling, simulation and data analytics in production and supply
networks; advanced, digital and smart manufacturing; digital and
virtual quality management systems; cloud-manufacturing;
cyber-physical production systems and digital twins; IIOT
interoperability; supply chain planning and optimization; digital
and smart supply chain management; intelligent logistics networks
management; artificial intelligence and blockchain technologies in
logistics and DSN; novel production planning and control
approaches; machine learning and artificial intelligence;
connected, smart factories of the future; manufacturing systems
engineering: agile, flexible, reconfigurable; digital assistance
systems: augmented reality and virtual reality; circular products
design and engineering; circular, green, sustainable manufacturing;
environmental and social lifecycle assessments; socio-cultural
aspects in production systems; data-driven manufacturing and
services operations management; product-service systems in DSN; and
collaborative design and engineering Part II: the Operator 4.0: new
physical and cognitive evolutionary paths; digital transformation
approaches in production management; digital transformation for
more sustainable supply chains; data-driven applications in smart
manufacturing and logistics systems; data-driven services:
characteristics, trends and applications; the future of lean
thinking and practice; digital lean manufacturing and its emerging
practices; new reconfigurable, flexible or agile production systems
in the era of industry 4.0; operations management in
engineer-to-order manufacturing; production management in food
supply chains; gastronomic service system design; product and asset
life cycle management in the circular economy; and production
ramp-up strategies for product
|
|