Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Advances in Security, Networks, and Internet of Things: Proceedings from Sam`20, Icwn`20, Icomp`20, and Escs`20, Daimi Kevin, Arabnia Hamid R., Deligiannidis Leonidas


Варианты приобретения
Цена: 39130.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Daimi Kevin, Arabnia Hamid R., Deligiannidis Leonidas
Название:  Advances in Security, Networks, and Internet of Things: Proceedings from Sam`20, Icwn`20, Icomp`20, and Escs`20
ISBN: 9783030710163
Издательство: Springer
Классификация:


ISBN-10: 3030710165
Обложка/Формат: Hardcover
Страницы: 874
Вес: 1.42 кг.
Дата издания: 11.07.2021
Язык: English
Размер: 23.39 x 15.60 x 4.78 cm
Ссылка на Издательство: Link
Поставляется из: Германии
Описание:

Statistical Analysis of Prime Number Generators Putting Encryption at Risk.- Secure Authentication Protocol for Drones in LTE Networks.- Memorable Password Generation with AES in ECB Mod.- A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model.- Suitability of Voice Recognition within the IoT Environment.- Chor-Rivest Knapsack Cryptosystem in a Post-Quantum World.- An Effective Tool for Assessing the Composite Vulnerability of Multi-Factor Authentication Technologies.- Phishing Prevention Using Defense in Depth.- Phishing Detection using Deep Learning.- Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach.- Vulnerability of Virtual Private Networks to Web Fingerprinting Attack.- Intrusion Detection through Gradient in Digraphs.- A Practice of Detecting Insider Threats within a Network.- Towards Home Area Network Hygiene: Device Classification and Intrusion Detection for Encrypted Communications.- The Impact of 21st Century Skills and Computing Cognition Cyber Skills on Graduates Work Readiness in Cyber Security.- Enhancing the Cybersecurity Education Curricula Through Quantum Computation.- CyberCheck.me: A Review of a Small to Medium Enterprise Cyber Security Awareness Program.- A Hybrid AI and Simulation-Based Optimization DSS for Post-Disaster Logistics.- A Posteriori Access Control with an Administrative Policy.- An Analysis of Applying STIR/Shaken to Prevent Robocalls.- Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid.- Vulnerability Analysis of 2500 Docker Hub Images.- Analysis of Conpot and its BACnet Features for Cyber-Deception.- Automotive Vehicle Security Metrics.- Requirements for IoT Forensic Models - A Review.- Mobile Malware Forensics Review: Issues and Challenges.- The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review.- A Hybrid Recommender System for Cybersecurity Based on a Rating Approach.- Secure-Stor: A Novel Hybrid Secure Edge Server Architecture and CDN to Enhance the Security and Response Time for Edge Devices.- Leveraging Security Management with Low-Level System Monitoring and Visualization.- Lightweight Network Steganography for Distributed Electronic Warfare System Communications.- Security of DBMSs.- Static Analysis for Software Reliability and Security.




ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия