You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning.
None
Learn how to take the "tease" out of brainteasers, and increase your puzzle IQ with this eye-opening guide to solving puzzles. Revealing the basic principles and strategies of cracking logic problems, it shows you, step-by-step, how to solve ten of the most common types of puzzles, from basic deduction conundrums to more complex mathematical bafflers. Packed with practice puzzles and offering hours of amusement and mental challenge, Increase Your Puzzle IQ gives you the know-how you need to decipher even the most puzzling of puzzles. Why are 1997 dollar bills worth more than 1980 dollar bills? In a box there are 20 balls, 10 white and 10 black. With a blindfold on, what is the least number you must draw out in order to get a pair of balls that matches? Which clock keeps the best time? The clock that loses a minute a day or one that doesn't run at all? I have two current U.S. coins in my hand. The two coins add up to 15?. One of the coins is not a nickel. What two coins do I have? How much dirt is there in a hole that is 1 foot wide by 1 foot long by 1 foot deep?
New Perspectives in Behavioral Cybersecurity offers direction for readers in areas related to human behavior and cybersecurity, by exploring some of the new ideas and approaches in this subject, specifically with new techniques in this field coming from scholars with very diverse backgrounds in dealing with these issues. It seeks to show an understanding of motivation, personality, and other behavioral approaches to understand cyberattacks and create cyberdefenses. This book: • Elaborates cybersecurity concerns in the work environment and cybersecurity threats to individuals. • Presents personality characteristics of cybersecurity attackers, cybersecurity behavior, and behavioral interventions. • Highlights the applications of behavioral economics to cybersecurity. • Captures the management and security of financial data through integrated software solutions. • Examines the importance of studying fake news proliferation by detecting coordinated inauthentic behavior. This title is an ideal read for senior undergraduates, graduate students, and professionals in fields including ergonomics, human factors, human-computer interaction, computer engineering, and psychology.
None
"TRB's National Cooperative Highway Research Program (NCHRP) Report 518: Safety Evaluation of Permanent Raised Pavement Markers examines the safety performance of snowplowable permanent raised pavement markers on two-lane roadways and four-lane freeways"--Publisher's description.
"This multiple-volume publication advances the emergent field of mobile computing offering research on approaches, observations and models pertaining to mobile devices and wireless communications from over 400 leading researchers"--Provided by publisher.
"Based on research and practitioner-generated reports, this book focuses on the emergence and growth of mobile telecommunications and mobile commerce around the world"--Provided by publisher.