46,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
23 °P sammeln
  • Broschiertes Buch

This book is a highly technical, mathematically as well as technologically speaking, work aiming at solving some of main contemporary cyber security challenges. Executables, assembly code, or ,similarly, dalvik, obfuscated bytecode are now everywhere in devices, information systems, smartphones. Intellectual property (processing or communications) and access control systems largely consist of software systems made of such wild, hard to control, hacker measuring (yet useful!) data. Think about your privacy in a bottom-up way, for database access might need executables to be made secure, too.…mehr

Produktbeschreibung
This book is a highly technical, mathematically as well as technologically speaking, work aiming at solving some of main contemporary cyber security challenges. Executables, assembly code, or ,similarly, dalvik, obfuscated bytecode are now everywhere in devices, information systems, smartphones. Intellectual property (processing or communications) and access control systems largely consist of software systems made of such wild, hard to control, hacker measuring (yet useful!) data. Think about your privacy in a bottom-up way, for database access might need executables to be made secure, too. High cost multicore microprocessor will be needed, yet this shall be revelations to security.
Autorenporträt
The author is a researcher involved in IoT, cyber security research, access control.His experience comes from famous collaborations within private centers of research excellenceknown worldwide. Nowadays, he is involved within international cooperations for projectsin the area of critical infrastructures protection (e.g. electrical grids)