The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber...
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical...
The fourth edition of the Official (ISC)2® Guide to the SSCP CBK® is a comprehensive resource providing an in-depth look at the seven domains of the...
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and...
So-called string problems are abundant in bioinformatics and computational biology. New optimization problems dealing with DNA or protein sequences...