Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Big Data Platforms and Applications
  • Language: en
  • Pages: 300

Big Data Platforms and Applications

This book provides a review of advanced topics relating to the theory, research, analysis and implementation in the context of big data platforms and their applications, with a focus on methods, techniques, and performance evaluation. The explosive growth in the volume, speed, and variety of data being produced every day requires a continuous increase in the processing speeds of servers and of entire network infrastructures, as well as new resource management models. This poses significant challenges (and provides striking development opportunities) for data intensive and high-performance computing, i.e., how to efficiently turn extremely large datasets into valuable information and meaningf...

Innovative Security Solutions for Information Technology and Communications
  • Language: en
  • Pages: 312

Innovative Security Solutions for Information Technology and Communications

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020. The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.

Innovative Security Solutions for Information Technology and Communications
  • Language: en
  • Pages: 278

Innovative Security Solutions for Information Technology and Communications

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Security for Information Technology and Communications, SecITC 2019, held in Bucharest, Romania, in November 2019. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 34 submissions. The papers present a wide range from cryptographic algorithms, to digital forensic and cyber security.

Innovative Security Solutions for Information Technology and Communications
  • Language: en
  • Pages: 228

Innovative Security Solutions for Information Technology and Communications

This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2023, held in Bucharest, Romania, in November 2023. The 14 full papers included in the book were carefully reviewed and selected from 57 submissions. They focus on all theoretical and practical aspects related to information technology and communications security.

Innovative Security Solutions for Information Technology and Communications
  • Language: en
  • Pages: 351

Innovative Security Solutions for Information Technology and Communications

This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8–9, 2022. The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.

Innovative Security Solutions for Information Technology and Communications
  • Language: en
  • Pages: 542

Innovative Security Solutions for Information Technology and Communications

  • Type: Book
  • -
  • Published: 2019-02-05
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Security for Information Technology and Communications, SecITC 2018, held in Bucharest, Romania, in November 2018. The 35 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 70 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.

Cryptography and Security in Computing
  • Language: en
  • Pages: 260

Cryptography and Security in Computing

The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.

Byzantine Military Organization on the Danube, 10th-12th Centuries
  • Language: en
  • Pages: 224

Byzantine Military Organization on the Danube, 10th-12th Centuries

  • Type: Book
  • -
  • Published: 2013-06-13
  • -
  • Publisher: BRILL

This product gives acces to both Brill's New Pauly Supplements Online II and Der Neue Pauly Supplemente II Online .

Identity Management for Internet of Things
  • Language: en
  • Pages: 185

Identity Management for Internet of Things

  • Type: Book
  • -
  • Published: 2022-09-01
  • -
  • Publisher: CRC Press

The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with ide...