Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Gestion des cookies
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can...Savoir plus
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myri...Savoir plus
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authenticatio...Savoir plus
The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains , is receiving increasing interest from various d...Savoir plus
Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how ...Savoir plus
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The cur...Savoir plus
The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience th...Savoir plus
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical in...Savoir plus
As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of th...Savoir plus
The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published dat...Savoir plus
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis a...Savoir plus
The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains , is receiving increasing interest from various d...Savoir plus
Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that u...Savoir plus
Digital forensic science , or digital forensics , is the application of scientific tools and methods to identify, collect, and analyze digital (data) ...Savoir plus
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical in...Savoir plus
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis a...Savoir plus
This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical ...Savoir plus
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conduc...Savoir plus
As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of th...Savoir plus
Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, pow...Savoir plus
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis a...Savoir plus
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of ...Savoir plus
This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical ...Savoir plus
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquia...Savoir plus