You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.
The second volume of riveting memoirs from Hans Kung, the leading - and controversial - theologian. Hans Küng has been a major influence on post-war Christianity by any reckoning. A peritus for the second Vatican council, he then went on to publish a number of controversial books, including Infallible? An Enquiry (1971), which enraged the Vatican and caused him to lose the ecclesiastical approval of his teaching at the university of Tübingen. However, he remains a respected priest in good standing with his bishop. Throughout all the upheavals that the Catholic Church has undergone in recent decades, Küng has been an outspoken observer, turning himself from enfant terrible to béte noire. ...
This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014. The 10 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: efficient implementations and designs; attacks; and protocols.
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written wit...
Poor data quality can seriously hinder or damage the efficiency and effectiveness of organizations and businesses. The growing awareness of such repercussions has led to major public initiatives like the "Data Quality Act" in the USA and the "European 2003/98" directive of the European Parliament. Batini and Scannapieco present a comprehensive and systematic introduction to the wide set of issues related to data quality. They start with a detailed description of different data quality dimensions, like accuracy, completeness, and consistency, and their importance in different types of data, like federated data, web data, or time-dependent data, and in different data categories classified acco...
This book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022. The 12 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The papers cover the following subjects: implementation attacks, secure implementation, implementation attack-resilient architectures and schemes, secure design and evaluation, practical attacks, test platforms, and open benchmarks.
Since its appearance in 1992, Barth David Schwartz's biography of Pier Paolo Pasolini (1922-1975) has been the standard reference and starting point for anyone embarking on a study of Pasolini in English, situating the multimedia artist within twentieth-century Italian and world culture. Pasolini was unique among his contemporaries--Federico Fellini, for example, didn't write novels, Giorgio Bassani did not direct films, and Eugenio Montale did not write popular journalism. Although Pasolini excelled at all of these genres, he was first and foremost a poet (see Chicago's bilingual edition of his selected poems from 2014). Whatever he was doing, Pasolini's poetry informed all aspects of his c...
This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools.
This book constitutes the proceedings of the 22nd International Conference on Smart Card Research and Advanced Applications, CARDIS 2023, held in Amsterdam, The Netherlands, during November 14–16, 2023. The 13 full papers presented in this volume were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: fault attacks; side-channel analysis; smartcards & efficient Implementations; and side-channel & neural networks.