|
|
Click the serial number on the left to view the details of the item. |
# |
Author | Title | Accn# | Year | Item Type | Claims |
1 |
Abaimov, Stanislav |
Machine Learning for Cyber Agents |
I12486 |
2022 |
Book |
|
2 |
Wolf, Ramona |
Quantum Key Distribution |
I11775 |
2021 |
eBook |
|
3 |
Grasselli, Federico |
Quantum Cryptography |
I11706 |
2021 |
eBook |
|
4 |
Patel, Dhiren |
IC-BCT 2019 |
I09718 |
2020 |
eBook |
|
5 |
Malizia, Andrea |
Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference |
I08562 |
2018 |
eBook |
|
|
1.
|
 |
Title | Machine Learning for Cyber Agents : Attack and Defence |
Author(s) | Abaimov, Stanislav;Martellini, Maurizio |
Publication | Cham, 1. Imprint: Springer
2. Springer International Publishing, 2022. |
Description | XV, 227 p. 27 illus., 23 illus. in color : online resource |
Abstract Note | The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter. With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area ??? the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention |
ISBN,Price | 9783030915858 |
Keyword(s) | 1. Computer networks???Security measures
2. Data and Information Security
3. Data protection
4. EBOOK
5. EBOOK - SPRINGER
6. MACHINE LEARNING
7. Mobile and Network Security
8. Security Science and Technology
9. Security systems
|
Item Type | Book |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12486 |
|
|
On Shelf |
|
|
|
|
2.
|
 |
Title | Quantum Key Distribution : An Introduction with Exercises |
Author(s) | Wolf, Ramona |
Publication | Cham, Springer International Publishing, 2021. |
Description | XI, 229 p. 56 illus., 31 illus. in color : online resource |
Abstract Note | This textbook introduces the non-specialist reader to the concepts of quantum key distribution and presents an overview of state-of-the-art quantum communication protocols and applications. The field of quantum cryptography has advanced rapidly in the previous years, not least because with the age of quantum computing drawing closer, traditional encryption methods are at risk. The textbook presents the necessary mathematical tools without assuming much background, making it accessible to readers without experience in quantum information theory. In particular, the topic of classical and quantum entropies is presented in great detail. Furthermore, the author discusses the different types of quantum key distribution protocols and explains several tools for proving the security of these protocols. In addition, a number of applications of quantum key distribution are discussed, demonstrating its value to state-of-the-art cryptography and communication. This book leads the reader through the mathematical background with a variety of worked-out examples and exercises. It is primarily targeted at graduate students and advanced undergraduates in theoretical physics. The presented material is largely self-contained and only basic knowledge in quantum mechanics and linear algebra is required |
ISBN,Price | 9783030739911 |
Keyword(s) | 1. Data and Information Security
2. Data protection
3. Data structures (Computer science)
4. Data Structures and Information Theory
5. EBOOK
6. EBOOK - SPRINGER
7. INFORMATION THEORY
8. QUANTUM COMMUNICATION
9. Quantum Communications and Cryptography
10. Quantum computing
11. QUANTUM INFORMATION
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I11775 |
|
|
On Shelf |
|
|
|
|
4.
|
 |
Title | IC-BCT 2019 : Proceedings of the International Conference on Blockchain Technology |
Author(s) | Patel, Dhiren;Nandi, Sukumar;Mishra, B.K;Shah, Deven;Modi, Chirag N;Shah, Kamal;Bansode, Rajesh S |
Publication | Singapore, Springer Singapore, 2020. |
Description | XII, 258 p. 126 illus., 55 illus. in color : online resource |
Abstract Note | This book presents articles from the International Conference on Blockchain Technology (IC-BCT) 2019, held in Mumbai, India, and highlights recent advances in the field. It brings together researchers and industry practitioners to show case their ideas linked to business case studies, and provides an opportunity for engineers, researchers, startups and professionals in the field of Blockchain technology to further collaboration |
ISBN,Price | 9789811545429 |
Keyword(s) | 1. Big data
2. BIG DATA ANALYTICS
3. COMPUTER ENGINEERING
4. Cyber-physical systems, IoT
5. Data protection
6. Data-driven Science, Modeling and Theory Building
7. EBOOK
8. EBOOK - SPRINGER
9. ECONOPHYSICS
10. Embedded computer systems
11. Internet of things
12. Security
13. Sociophysics
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I09718 |
|
|
On Shelf |
|
|
|
|
5.
|  |
Title | Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference : Science as the first countermeasure for CBRNE and Cyber threats |
Author(s) | Malizia, Andrea;D'Arienzo, Marco |
Publication | Cham, Springer International Publishing, 2018. |
Description | XII, 458 p. 160 illus., 140 illus. in color : online resource |
Abstract Note | This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE |
ISBN,Price | 9783319917917 |
Keyword(s) | 1. CHEMISTRY
2. COMPUTER SECURITY
3. Data protection
4. EBOOK
5. EBOOK - SPRINGER
6. Effects of Radiation/Radiation Protection
7. Radiation protection
8. Radiation???Safety measures
9. Safety in Chemistry, Dangerous Goods
10. Security
11. Security Science and Technology
12. System safety
13. Systems and Data Security
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I08562 |
|
|
On Shelf |
|
|
|
| |