Apple Watch, Smart Glasses, Fitness & Health Monitors, Virtual Reality Goggles. How will embedded and wearable technologies such as these, and others to come, affect consumers and businesses? A groundbreaking work by Brett King, founder of the world's first mobile bank
This book focuses on security issues in the IoT environment. It analyzes the security problems of each layer separately and try to identity solutions. It also analyzes the integration and scalability issues with the cross-layer architecture of IoT in detail.
In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and intriguing book, Matt Curtin charts the rise and fall of DES and chronicles the efforts of those who were determined to master it.
This book focuses on the 'algorithmic turn' in state surveillance and the development of new platforms that allow the Chinese Communist Party to shape human behaviour in all areas of life through its widespread social credit system.
Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in cloud computing.
This accessible, non-technical book reveals how, starting in the 1800s, scientists have used mathematical models and computer simulations to demonstrate that climate change is real - and accelerating. Readers will learn where the key scientific ideas came from, how they were tested, and what future these models forecast for our planet.