Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Gestion des cookies
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis...Savoir plus
This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presen...Savoir plus
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize tha...Savoir plus
Encryption of visual data is an important topic in the area of mutimedia security, applications range from digital rights management to secure persona...Savoir plus
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, ope...Savoir plus
Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations. This boo...Savoir plus
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentraliz...Savoir plus
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Sy...Savoir plus
Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prev...Savoir plus
Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looki...Savoir plus
Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Many malicious attacks on critical infrastructures ...Savoir plus
Now that the internet is omnipresent, companies have increasingly put critical resources online, giving rise to the activities of cyber criminals. Thi...Savoir plus
The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing and inter...Savoir plus
This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book...Savoir plus
While virus scanners and firewalls have visible benefits and remain virtually unnoticed during normal operations, the situation is different with intr...Savoir plus
A number of issues combine to make network protocol development significantly more difficult than other areas of computer programming. The combination...Savoir plus
Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been ...Savoir plus
Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individ...Savoir plus
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support a...Savoir plus
This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastr...Savoir plus
Impacts and Risk Assessment of Technology for Internet Security-Enabled Information Small-Medium Enterprises details the key impacts and risk assessme...Savoir plus
Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems. The cha...Savoir plus
This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor network...Savoir plus