Sign up for offers & news
Enter your email address to receive news and special offers.
Written by a team of experts at the forefront of the cyber-physical systems CPS revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals.
By Keith Martin
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for various technologies.
In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code or computer science jargon are used. No previous knowledge in computer science, programming or cryptography is required. This book bridges the gap that exists between technical books about the blockchain and business-focused books.
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows...
By Seth Misenar
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are...
By Siraj Raval
Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. In this practical guide, author Siraj Raval explains why dapps will become more widely used-and profitable-than today's most popular web apps.
Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition continues to present the same straightforward, practical information that has made previous editions so popular. For most computer users, practical computer security poses...
By Finn Brunton
How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less-and why we should.