|
Showing 1 - 5 of
5 matches in All Departments
The concept of quantum computing is based on two fundamental
principles of quantum mechanics: superposition and entanglement.
Instead of using bits, qubits are used in quantum computing, which
is a key indicator in the high level of safety and security this
type of cryptography ensures. If interfered with or eavesdropped
in, qubits will delete or refuse to send, which keeps the
information safe. This is vital in the current era where sensitive
and important personal information can be digitally shared online.
In computer networks, a large amount of data is transferred
worldwide daily, including anything from military plans to a
country's sensitive information, and data breaches can be
disastrous. This is where quantum cryptography comes into play. By
not being dependent on computational power, it can easily replace
classical cryptography. Limitations and Future Applications of
Quantum Cryptography is a critical reference that provides
knowledge on the basics of IoT infrastructure using quantum
cryptography, the differences between classical and quantum
cryptography, and the future aspects and developments in this
field. The chapters cover themes that span from the usage of
quantum cryptography in healthcare, to forensics, and more. While
highlighting topics such as 5G networks, image processing,
algorithms, and quantum machine learning, this book is ideally
intended for security professionals, IoT developers, computer
scientists, practitioners, researchers, academicians, and students
interested in the most recent research on quantum computing.
Software Security: Concepts & Practices is designed as a
textbook and explores fundamental security theories that govern
common software security technical issues. It focuses on the
practical programming materials that will teach readers how to
implement security solutions using the most popular software
packages. It's not limited to any specific cybersecurity subtopics
and the chapters touch upon a wide range of cybersecurity domains,
ranging from malware to biometrics and more. Features The book
presents the implementation of a unique socio-technical solution
for real-time cybersecurity awareness. It provides comprehensible
knowledge about security, risk, protection, estimation, knowledge
and governance. Various emerging standards, models, metrics,
continuous updates and tools are described to understand security
principals and mitigation mechanism for higher security. The book
also explores common vulnerabilities plaguing today's web
applications. The book is aimed primarily at advanced
undergraduates and graduates studying computer science, artificial
intelligence and information technology. Researchers and
professionals will also find this book useful.
Wireless network security research is multidisciplinary in nature,
including data analysis, economics, mathematics, forensics,
information technology, and computer science. This text covers
cutting-edge research in computational intelligence systems from
diverse fields on the complex subject of wireless communication
security. It discusses important topics including computational
intelligence in wireless network and communications, artificial
intelligence and wireless communication security, security risk
scenarios in communications, security/resilience metrics and their
measurements, data analytics of cyber-crimes, modeling of wireless
communication security risks, advances in cyber threats and
computer crimes, adaptive and learning techniques for secure
estimation and control, decision support systems, fault tolerance
and diagnosis, cloud forensics and information systems, and
intelligent information retrieval. The book: Discusses
computational algorithms for system modeling and optimization in
security perspective Focuses on error prediction and fault
diagnosis through intelligent information retrieval via wireless
technologies Explores a group of practical research problems where
security experts can help develop new data-driven methodologies
Covers application on artificial intelligence and wireless
communication security risk perspective The text is primarily
written for senior undergraduate, graduate students, and
researchers in the fields of electrical engineering, electronics
and communication engineering, and computer engineering. The text
comprehensively discusses wide range of wireless communication
techniques with emerging computational intelligent trends, to help
readers understand the role of wireless technologies in
applications touching various spheres of human life with the help
of hesitant fuzzy sets based computational modeling. It will be a
valuable resource for senior undergraduate, graduate students, and
researchers in the fields of electrical engineering, electronics
and communication engineering, and computer engineering.
Software evolution is a time-consuming and costly process due to
its complex architecture. Software designers need to produce
software that is effective as well as durable. Durability and
effectiveness of software are the foremost priorities and
challenges for developers. This book comprises real-life case
studies of durability issues and their solutions that bring to
light loopholes and show how to fix them, to enhance durability.
Existing literature on software durability tells us that the first
step is to recognise the problem. It gives information about
durability, risk, estimation, knowledge, and governance based on
five main characteristics: dependability, trustworthiness,
usability, security, and human trust. The book serves as a complete
package to get acquainted with assurance and risk management from a
software durability perspective. It enhances our understanding of
the concept of durability, its multi-dimensional approach, threats
and their types, risk, mitigation techniques, and suggestive
measures. The book reviews the emerging trends in the software
development process in the context of durability concepts such as
automated code reviews, coding standards, and software durability
standards and their testing, cost management solutions, low-code or
no-code solutions, and durability assurance.
The concept of quantum computing is based on two fundamental
principles of quantum mechanics: superposition and entanglement.
Instead of using bits, qubits are used in quantum computing, which
is a key indicator in the high level of safety and security this
type of cryptography ensures. If interfered with or eavesdropped
in, qubits will delete or refuse to send, which keeps the
information safe. This is vital in the current era where sensitive
and important personal information can be digitally shared online.
In computer networks, a large amount of data is transferred
worldwide daily, including anything from military plans to a
country's sensitive information, and data breaches can be
disastrous. This is where quantum cryptography comes into play. By
not being dependent on computational power, it can easily replace
classical cryptography. Limitations and Future Applications of
Quantum Cryptography is a critical reference that provides
knowledge on the basics of IoT infrastructure using quantum
cryptography, the differences between classical and quantum
cryptography, and the future aspects and developments in this
field. The chapters cover themes that span from the usage of
quantum cryptography in healthcare, to forensics, and more. While
highlighting topics such as 5G networks, image processing,
algorithms, and quantum machine learning, this book is ideally
intended for security professionals, IoT developers, computer
scientists, practitioners, researchers, academicians, and students
interested in the most recent research on quantum computing.
|
|