Processing ......
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
 
Security of Ubiquitous Computing Systems
网址居 (LinkBasket) - 中英文世界消息尽在此处!.
  • Title: Security of Ubiquitous Computing Systems
  • Author(s) Gildas Avoine, Julio Hernandez-Castro
  • Publisher: Springer; 1st ed. 2021 edition (January 15, 2021); eBook (Open Access Edition)
  • License(s): CC BY 4.0
  • Hardcover: 283 pages
  • eBook: PDF (268 pages) and ePub
  • Language: English
  • ISBN-10/ASIN: 3030105903
  • ISBN-13: 978-3030105907
  • Share This:  

Book Description

The objective of this open access book was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems.

The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols.

The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.

About the Authors
  • N/A
Reviews, Ratings, and Recommendations: Related Book Categories: Read and Download Links: Similar Books:
  • Security Concepts (Subspacefield)

    This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.

  • Rational Cybersecurity for Business (Daniel Blum)

    This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience.

  • Security Engineering: Building Dependable Distributed Systems

    It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.

  • Computer Security Handbook (Seymour Bosworth, et al.)

    This handbook has compiled advice about how to minimize the possibility of computer security breaches in your systems. It provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more.

  • Handbook of Information Security Management (Micki Krause)

    Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.

Book Categories
:
Other Categories
Resources and Links