Télécharger le livre :  SCADA Security
Ajouter à ma liste d'envies
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems?the control system architecture that uses computers, networked data communications, and graphical user...

Editeur : Wiley
Parution : 2020-12-09
Collection : Wiley Series on Parallel and Distributed Computing
PDF, ePub

127,60
Télécharger le livre :  Homomorphic Encryption and Applications
Ajouter à ma liste d'envies
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud...

Editeur : Springer
Parution : 2014-11-06
Collection : SpringerBriefs in Computer Science
ePub

79,11