Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
An introduction to the Python programming language and its most popular tools for scientists, engineers, students, and anyone who wants to use Python for research, simulations, and collaboration.Doing Science with Python introduces readers to the most popular coding tools for scientific research, such as Anaconda, Spyder, Jupyter Notebooks, and JupyterLab, as well as dozens of important Python libraries for working with data, including NumPy, matplotlib, and pandas. No prior programming experience is required! You'll be guided through setting up a professional coding environment, then get a crash course on programming with Python, and explore the many tools and libraries ideal for working with data, designing visualizations, simulating natural events, and more. In the book's applied projects, you'll use these tools to write programs that perform tasks like counting tree rings, creating an interactive science slideshow, and simulating the foraging patterns of animals.
Blockchain Beyond Bitcoin: A deep dive into the emerging technologies and innovations powered by blockchain, such as smart contracts, decentralized applications, digital identity, supply chain, voting, and more. Learn how blockchain works, why it matters, and how to use it for various purposes and industries.
A broad introduction to cryptography—what it is, how it really works, what its future holds, and why every informed citizen should understand its basics.We all keep secrets—from our gym locker codes to our email passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In this fascinating book Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets. Louridas explains just how cryptography works to keep our communications confidential, tracing it back all the way to its ancient roots. Then he follows its long and winding path to where we are today and reads the signs that point to where it may go tomorrow.A few years back, interest in cryptography was restricted to specialists. Today, as we all live our lives attuned to our digital footprint and the privacy issues it entails, it becomes more and more essential to have a basic understanding of cryptography and its applications to everyday life. Starting with classical cryptography, Cryptography takes the reader all the way up to the twenty-first century cryptographic applications that underpin our lives in the digital realm. Along the way, Louridas also explains concepts such as symmetric cryptography, asymmetric cryptography, cryptographic protocols and applications, and finally, quantum and post-Quantum cryptography as well as the links between cryptography and computer security.
This book investigates data security approaches in Heterogeneous Communications Networks (HCN). First, the book discusses the urgent need for a decentralized data management architecture in HCN. The book investigates preliminaries and related research to help readers obtain a comprehensive picture of the research topic. Second, the book presents three blockchain-based approaches for data management in HCN: data provenance, data query, and data marketing. Finally, based on the insights and experiences from the presented approaches, the book discusses future research directions.
This book constitutes revised selected papers from the 4th International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2023, which took place in Bizerte, Tunisia, on May 27, 2023.The 6 full papers included in this book were carefully reviewed and selected from 13 submissions. The book also contains one invited talk. The contributions focus on vehicular networks and emerging technologies and cyber safety and security of intelligent transportation systems.
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication.Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.
A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionTLS is the most widely used cryptographic protocol today, enabling e-commerce, online banking, and secure online communication. TLS Cryptography in Depth will help you gain a deep understanding of how and why TLS works, how past attacks on TLS were possible, and how vulnerabilities that enabled them were addressed in the latest TLS version 1.3. By exploring the inner workings of TLS, you'll be able to configure it and use it more securely.Starting with the basic concepts, you'll be led step by step through the world of modern cryptography, guided by the TLS protocol. As you advance, you'll be learning about the necessary mathematical concepts from scratch. Even seemingly arcane topics such as public-key cryptography based on elliptic curves will be explained with a view on real-world applications in TLS. With easy-to-understand concepts, you'll find out how secret keys are generated and exchanged in TLS, and how they are used to create a secure channel between a client and a server.By the end of this book, you'll have understood the inner workings of TLS and how to configure TLS servers securely. Moreover, you'll have gained a deep knowledge of the cryptographic primitives that make up TLS and will be able to apply this knowledge in other security-related contexts.What you will learn- Understand TLS principles and protocols for secure internet communication- Find out how cryptographic primitives are used within TLS V1.3- Discover best practices for secure configuration and implementation of TLS- Evaluate and select appropriate cipher suites for optimal security- Get an in-depth understanding of common cryptographic vulnerabilities and ways to mitigate them- Explore forward secrecy and its importance in maintaining confidentiality- Understand TLS extensions and their significance in enhancing TLS functionalityWho this book is forThis book is for IT professionals, cybersecurity professionals, security engineers, cryptographers, software developers, and administrators looking to gain a solid understanding of TLS specifics and their relationship with cryptography. This book can also be used by computer science and computer engineering students to learn about key cryptographic concepts in a clear, yet rigorous way with its applications in TLS. There are no specific prerequisites, but a basic familiarity with programming and mathematics will be helpful.Table of Contents- The Role of Cryptography in the Connected World- Secure Channel and the CIA Triad- A Secret to Share- Encryption and Decryption- Entity Authentication- Transport Layer Security at a Glance- Public-Key Cryptography- Elliptic Curves- Digital Signatures- Digital Certificates and Certification Authorities- Hash Functions and Message Authentication Codes- Secrets and Keys in TLS 1.3- TLS Handshake Protocol Revisited- Block Ciphers and Their Modes of Operation- Authenticated Encryption- The Galois Counter Mode- TLS Record Protocol Revisited- TLS Cipher Suites- Attacks on Cryptography- Attacks on the TLS Handshake Protocol- Attacks on the TLS Record Protocol- Attacks on TLS Implementations
Blockchain is transforming far more than finance through an explosion of decentralized projects aiming to remake entire systems. This book illuminates the expanding universe of DePINs - Decentralized Projects -that leverage blockchain's unique capabilities to drive revolutionary change.Learn how DePINs are pioneering new models of grassroots innovation across crucial realms like energy, connectivity, identity, governance, environmental sustainability and economic inclusion. Early examples hint at how rearchitecting systems around participation and transparency unlocks unprecedented opportunities to rebuild outdated infrastructure and unsafeguarded data monopolies.The book guides readers through the emerging landscape, showcasing use cases and paradigms where decentralized solutions address systemic issues overlooked by legacy centralized systems and profit-driven disruptors. Clear explanations make the technologies accessible for non-experts, while emphasizing real-world challenges and benefits over hype.Ultimately this work reveals how the DePIN revolution promises a future that is not just decentralized but also greener, more equitable, collaborative and empowering. But this requires expanding imagination beyond existing constraints. The book aims to accelerate this critical mindset shift ahead.
Elpanorama financiero ha cambiado recientemente debido a las criptomonedas, que tienen los intereses de los inversores entodo el mundo. El auge de Bitcoin y la aparición de innumerables altcoins han transformado la industria de las criptomonedas en unhervidero de oportunidades lucrativas. Sin embargo, la gestión de este mercado volátil y complejo requiere una comprensión profunda de sus complejidades y un enfoque estratégico de las inversiones.Bienvenido a "Inversión en criptomonedas: navegando por el mercado de criptomonedas - Estrategias y consejos para inversionesrentables". Profundizaremos en el mundo de las criptomonedas en este libro electrónico y le brindaremos información perspicaz,estrategias rentables y consejos para ayudarlo a tomar decisiones acertadas.El capítulo inicial del libro electrónico proporcionará la base para comprender las criptomonedas guiándolo a través de su definiciónfundamental y muchas variedades. Analizaremos sus cualidades distintivas y trazaremos su evolución para comprender mejor surelevancia en el mundo financiero.Invertir en criptomonedas conlleva sus propios riesgos y desafíos, al igual que cualquier otro tipo de inversión. En el siguiente capítulo,abordaremos estos problemas de frente hablando de la volatilidad del mercado, los problemas legales, los riesgos de seguridad y los fraudes frecuentes a los que hay que prestar atención. Con esta información, estarás más preparado para proteger tus inversiones.
This book presents the best papers from the 4th International Conference on Mathematical Research for Blockchain Economy (MARBLE) 2023, held in London, UK. While most blockchain conferences and forums are dedicated to business applications, product development, or Initial Coin Offering (ICO) launches, this conference focused on the mathematics behind blockchain to bridge the gap between practice and theory.The book spans the divide between theoretical promise and practical reality in blockchain technology and explores the challenges hindering its real-world integration across diverse sectors, offering comprehensive insights into issues like scalability, security, and privacy.
This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence.The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity.During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies.Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.
This book takes readers through the sensational history of blockchains and their potential to revolutionize database systems of the future. In order to demystify blockchains, the book capitalizes on decades of research and field testing of existing database and distributed systems and applies these familiar concepts to the novel blockchain system. It then utilizes this framework to explore the essential block platform underpinning blockchains, which is often misunderstood as a specific attribute of cryptocurrencies rather than the core of the decentralized system independent of application. The book explores the nature of these decentralized systems, which have no single owner and build robustness through a multitude of stakeholder contributions. In this way, blockchains can build trust into existing systems and thus present attractive solutions for various domains across both academia and industry. Despite this, high-impact and real-world applications of blockchain have yet to be realized outside of cryptocurrencies like Bitcoin. The book establishes how this new data system, if properly applied, can disrupt the sector in much the same way databases did so many years ago. The book explores the fundamental technical limitations that may be preventing blockchain from realizing this potential and how to overcome or mitigate them. Readers who are completely new to blockchains will find this book to be a comprehensive survey of the state of the art in blockchain technology. Readers with some experience of blockchains, for example through developing cryptocurrencies, will likely find the book's database perspective enlightening. Finally, researchers already working with blockchain will learn to identify existing gaps in the design space and explore potential solutions for creating the next generation of blockchain systems.
¿This book constitutes the revised selected papers from the workshops affiliated with the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which took place in Bol, Brä, Croatia, in May 2023. The 7 full papers presented in this book were carefully reviewed and selected from 18 submissions. They stem from the following workshops:CoDecFin 2022: 3rd Workshop on Coordination of Decentralized FinanceDeFi 2022: 2nd Workshop on Decentralized FinanceVoting 2022: 7th Workshop on Advances in Secure Electronic VotingWTSC 2022: 6th Workshop on Trusted Smart Contracts
This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023.The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
This book introduces readers to the fundamentals of and recent advances in federated learning, focusing on reducing communication costs, improving computational efficiency, and enhancing the security level. Federated learning is a distributed machine learning paradigm which enables model training on a large body of decentralized data. Its goal is to make full use of data across organizations or devices while meeting regulatory, privacy, and security requirements. The book starts with a self-contained introduction to artificial neural networks, deep learning models, supervised learning algorithms, evolutionary algorithms, and evolutionary learning. Concise information is then presented on multi-party secure computation, differential privacy, and homomorphic encryption, followed by a detailed description of federated learning. In turn, the book addresses the latest advances in federate learning research, especially from the perspectives of communication efficiency, evolutionary learning, and privacy preservation.The book is particularly well suited for graduate students, academic researchers, and industrial practitioners in the field of machine learning and artificial intelligence. It can also be used as a self-learning resource for readers with a science or engineering background, or as a reference text for graduate courses.
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.Topics and features:* Covers the essential standards in Internet cryptography* Integrates work exercises and problems in each chapter* Focuses especially on IPsec, secure e-mail and TLS* Summarizes real-world cryptography in three introductory chapters* Includes necessary background from computer networks* Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes* Provides additional background on web security in two concluding chaptersOffering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.Professor Dr. Jorg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book's topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.
This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Next, they show how these technologies have come together in collaborative or adversarial ways. In the next section, the authors highlight the coevolution being formed between cryptography and AI. Throughout the book, the authors use evidence from state-of-the-art research to look ahead at the future of the crypto-AI dichotomy. The authors explain how they anticipate that quantum computing will join the dichotomy in near future, augmenting it to a trichotomy. They verify this through two case studies highlighting another scenario wherein crypto, AI and quantum converge. The authors study current trends in chaotic image encryption as well as information-theoretic cryptography and show how these trends lean towards quantum-inspired artificial intelligence (QiAI). After concluding the discussions, the authors suggest future research for interested researchers.
Die Kryptographie, wie sie in diesem Jahrhundert betrieben wird, ist stark mathematisch geprägt. Aber sie hat auch ihre Wurzeln in dem, was rechnerisch machbar ist.In diesem einzigartigen Lehrbuch werden die Theoreme der Mathematik gegen die Machbarkeit von Berechnungen abgewogen. Kryptografie ist etwas, das man tatsächlich "macht", kein mathematisches Spiel, über das man Theoreme beweist. Es gibt tiefgründige Mathematik; es gibt einige Theoreme, die bewiesen werden müssen; und es besteht die Notwendigkeit, die brillante Arbeit derjenigen anzuerkennen, die sich auf die Theorie konzentrieren. Auf der Ebene eines Grundstudiums sollte der Schwerpunkt jedoch zunächst darauf liegen, die Algorithmen zu kennen und zu verstehen und zu wissen, wie sie zu implementieren sind, und sich auch bewusst zu machen, dass die Algorithmen sorgfältig implementiert werden müssen, um die "einfachen" Wege zum Brechen der Kryptografie zu vermeiden. Dieser Text deckt die algorithmischen Grundlagen ab und wird durch Kernmathematik und Arithmetik ergänzt.
This book constitutes the proceedings of the 19th IMA International Conference, IMACC 2023, held in London, UK, during December 12¿14, 2023The 14 full papers included in this volume were carefully reviewed and selected from 36 submissions. This volume presents cutting-edge results in a variety of areas, including coding theory, symmetric cryptography, zeroknowledge protocols, digital signature schemes and extensions, post-quantum cryptography and cryptography in practice.
This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16¿17, 2023.The 18 full papers included in this volume were carefully reviewed and selected from 55 submissions. This volume focuses on a broad range of topics within IT security and privacy.
This handbook aims to serve as a one-stop, reliable source of reference, with curations of survey and expository contributions on the state-of-the-art in Blockchain technology. It covers a comprehensive range of topics, providing the technical and non-technical reader with fundamentals, applications, and deep details on a variety of topics. The readership is expected to span broadly from technologically-minded business professionals and entrepreneurs, to students, instructors, novices and seasoned researchers, in computer science, engineering, software engineering, finance, and data science. Though Blockchain technology is relatively young, its evolution as a field and a practice is booming in growth and its importance to society had never been more important than it is today. Blockchain solutions enable a decentralization of a digital society where people can contribute, collaborate, and transact without having to second-guess the trust and transparency factors with many geographical, financial, and political barriers removed. It is the distributed ledger technology behind the success of Bitcoin, Ethereum, and many emerging applications.The resource is divided into 5 parts. Part 1 (Foundation) walks the reader through a comprehensive set of essential concepts, protocols, and algorithms that lay the foundation for Blockchain. Part 2 (Scalability) focuses on the most pressing challenges of today's blockchain networks in how to keep pace with real-world expectations. Part 3 (Trust and Security) provides detailed coverage on the issues of trust, reputation, and security in Blockchain. Part 4 (Decentralized Finance) is devoted to a high-impact application of Blockchain to finance, the sector that has most benefitted from this technology. Part 5 (Application and Policy) includes several cases where Blockchain applies to the real world.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.