You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The main objective of this book is to cater to the need of a quality textbook for education in the field of information security. The present third edition of the book covers the principles, design, and implementation of various algorithms in cryptography and information security domain. The book is a comprehensive work with a perfect balance and systematic presentation of the theoretical and practical aspects. The pre-requisite of the cryptography are the fundamentals of the mathematical background. The book covers all such relevant methods and theorems, which are helpful to the readers to get the necessary mathematical base for the understanding of the cryptographic algorithms. It provides...
This well-organized book presents the principles, techniques, design, and implementation of cloud computing, with a perfect balance in the presentation of theoretical and practical aspects. The book, after providing a brief introduction to the subject, gives a clear analysis of different cloud computing models and explains all the relevant concepts on virtualization, security issues and challenges in cloud computing. In addition to this, the book introduces the reader with some of the prominent cloud service provider companies like Amazon, Microsoft and Google, and discusses the various features of these web services. Further, to provide the necessary background required to understand the principles of cloud computing, the roadmap for migration of application to cloud and roles of different standards used for cloud computing are discussed in detail. The discussion ends after addressing mobile cloud computing and microservices—the recent advances in cloud computing. The book is primarily intended for the undergraduate and postgraduate students of computer science and engineering, and information technology.
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security.
The role of manufacturing in a country’s economy and societal development has long been established through their wealth generating capabilities. To enhance and widen our knowledge of materials and to increase innovation and responsiveness to ever-increasing international needs, more in-depth studies of functionally graded materials/tailor-made materials, recent advancements in manufacturing processes and new design philosophies are needed at present. The objective of this volume is to bring together experts from academic institutions, industries and research organizations and professional engineers for sharing of knowledge, expertise and experience in the emerging trends related to design, advanced materials processing and characterization, and advanced manufacturing processes.
None
This book includes high impact papers presented at the International Conference on Communication, Computing and Electronics Systems 2019, held at the PPG Institute of Technology, Coimbatore, India, on 15-16 November, 2019. Discussing recent trends in cloud computing, mobile computing, and advancements of electronics systems, the book covers topics such as automation, VLSI, embedded systems, integrated device technology, satellite communication, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, Internet of Things, precision models, bioinformatics, and healthcare informatics.
CYBER SECURITY AND DIGITAL FORENSICS Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes. Current cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the use of computers as a way of storing and retrieving high-security information requires appropriate securi...