1
by Canlas, Roman, Price, Ed
Published 2021
Packt Publishing
... code that presents the problem and corresponding solutions to eliminate the security bug. You'll...

2
by Wilkins, Mark
Published 2024
O'Reilly Media, Inc.
...Understand the importance of data security controls in protecting sensitive data stored...

3
by Shih, Frank Y.
Published 2013
CRC Press
Subjects: ...Multimedia communications / Security measures...

4
Published 2021
Springer Nature Singapore
Table of Contents: ... Technology and Applications -- Internet of Things -- Security and Privacy...

5
by Das, BK Sarthak
Published 2023
O'Reilly Media

6
Published 2022
O'Reilly Media, Inc.
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

7
by Khattab, Ahmed, Jeddi, Zahra, Amini, Esmaeil, Bayoumi, Magdy
Published 2017
Springer International Publishing
Table of Contents: ...Part I. RFID Security Preliminaries -- 1. Introduction to RFID -- 2. RFID Security Threats...

8
Published 2022
O'Reilly Media, Inc.
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

9
by Sletten, Brian
Published 2024
O'Reilly Media, Inc.

10
by Manico, Jim
Published 2015
Mc Graw Hill Education
...This book presents the processes required to build robust and secure applications from the start...

11
by Tang, Jack, Ibrahim, Mohamed, Chakrabarty, Krishnendu, Karri, Ramesh
Published 2020
Springer International Publishing
Table of Contents: ...Chapter 1. Cyberphysical Microfluidic Biochips -- Chapter 2. Security and Trust -- Chapter 3...

12
by Baker, Matthew
Published 2022
Apress
Table of Contents: ... -- 12. Logging and Monitoring -- 13. Third-Party and Supply Chain Security -- 14. Further Resources...

13
by Sisejkovic, Dominik, Leupers, Rainer
Published 2023
Springer International Publishing
Table of Contents: ...Introduction to Hardware Security -- Design-for-Trust (DfTr) Solutions -- Evolution of Logic...

14
Published 2013
Springer Berlin Heidelberg
... performance and parallel computing, bioinformatics, human computer interaction, security and cryptography...

15
Published 2016
Springer International Publishing
Table of Contents: ...Part I : Hardware Security Primitives -- Disorder-Based Security Hardware: An Overview -- Design...

16
by Gumzej, Roman
Published 2016
Springer International Publishing
Table of Contents: ... for Specification PEARL.-UML Safety Pattern for Specification PEARL -- Specification PEARL Security -- Evaluation...

17
Published 2018
Springer International Publishing
...This book provides security analyses of several Software Defined Networking (SDN) and Network...

18
Published 2018
Springer Nature Singapore
Subjects: ...Data and Information Security...

19
by Sehgal, Naresh Kumar, Bhatt, Pramod Chandra P., Acken, John M.
Published 2020
Springer International Publishing
Table of Contents: ... and Information Security -- Migrating to Cloud -- Migrating a Complex Industry to Cloud -- Cost and Billing...

20
by Farahmandi, Farimah, Huang, Yuanwen, Mishra, Prabhat
Published 2020
Springer International Publishing
Table of Contents: ...Introduction -- Security Verification Using Formal Methods -- Simulation-Based Security Validation...