The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber...
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical...
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said...
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth...
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is...