Browse
Author profile
Load More
TRAINING MAJORS
- Khoa Điện - Tự động hóa (667)
- Khoa Công nghệ thông tin (342)
- Khoa Cơ khí (275)
- Khoa Dệt may và Thời Trang (94)
- Khoa Công nghệ thực phẩm (78)
Load More
Học liệu điện tử (Electronic learning materials)
Browsing Học liệu điện tử (Electronic learning materials) by Subject "Computer security"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
- PublicationBlockchain Security From the Bottom Up : Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts(Wiley, 2022) Poston III, Howard E.The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant and educator Howard E. Poston delivers an authoritative exploration of blockchain and crypto cybersecurity. In the book, the author shows you exactly how cybersecurity should be baked into the blockchain at every layer of the technology's ecosystem. You'll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution.
- PublicationComputer Security and Encryption : An Introduction(Mercury Learning & Information, 2020) Chauhan, S. R.; Jangra, S.Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based.
- PublicationOnline Social Networks Security : Principles, Algorithm, Applications, and Perspectives(CRC Press, 2021) Gupta, Brij B.; Sahoo, Somya RanjanIn recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one another's accounts. OSNs obliterate geographical distance and can breach economic barrier.
- PublicationSecure Data Science : Integrating Cyber Security and Data Science(CRC Press, 2022) Thuraisingham, Bhavani; Kantarcioglu, Murat; Khan, LatifurSecure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied not only for cyber security but also for every application area—including healthcare, finance, manufacturing, and marketing—could be attacked by malware. Furthermore, due to the power of data science, it is now possible to infer highly private and sensitive information from public data, which could result in the violation of individual privacy.
- PublicationThe IoT Architect's Guide to Attainable Security and Privacy(Auerbach Publications, 2020) Fagbemi, Damilare D.; Wheeler, David M.; Wheeler, JCThis book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining.'Filled with practical and relevant examples based on years of experience... with lively discussions and storytelling related to loT security design flaws and architectural issues.'— Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community.