Listing 1 - 4 of 4 |
Sort by
|
Choose an application
With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi® and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax®, the need for effective solutions to the inherent security weaknesses of these networking technologies has become of critical importance. Thoroughly explaining the risks associated with deploying WLAN and WMAN networks, this groundbreaking book offers you practical insight into identifying and overcoming these security issues.
Choose an application
A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.
Computer networks - Security measures. --- Multicasting (Computer networks) - Security measures. --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Multicasting (Computer networks) - Security measures --- Computer networks - Security measures
Choose an application
How to create an Internet of Trusted Data in which insights from data can be extracted without collecting, holding, or revealing the underlying data. Trusted Data describes a data architecture that places humans and their societal values at the center of the discussion. By involving people from all parts of the ecosystem of information, this new approach allows us to realize the benefits of data-driven algorithmic decision making while minimizing the risks and unintended consequences. It proposes a software architecture and legal framework for an Internet of Trusted Data that provides safe, secure access for everyone and protects against bias, unfairness, and other unintended effects. This approach addresses issues of data privacy, security, ownership, and trust by allowing insights to be extracted from data held by different people, companies, or governments without collecting, holding, or revealing the underlying data. The software architecture, called Open Algorithms, or OPAL, sends algorithms to databases rather than copying or sharing data. The data is protected by existing firewalls; only encrypted results are shared. Data never leaves its repository. A higher security architecture, ENIGMA, built on OPAL, is fully encrypted. Contributors /Michiel Bakker, Yves-Alexandre de Montjoye, Daniel Greenwood, Thomas Hardjoni, Jake Kendall, Cameron Kerry, Bruno Lepri, Alexander Lipton, Takeo Nishikata, Alejandro Noriega-Campero, Nuria Oliver, Alex Pentland, David L. Shrier, Jacopo Staiano, Guy Zyskind An MIT Connection Science and Engineering Book.
Electronic data interchange --- Data transmission systems --- Trust --- Security measures --- Economic aspects --- Data transmission systems. --- Security measures. --- Economic aspects. --- Trust (Psychology) --- Attitude (Psychology) --- Emotions --- Business data interchange, Electronic --- EDI (Electronic data interchange) --- Electronic business data interchange --- Business --- Electronic commerce --- Data communication systems --- Transmission of data --- Digital communications --- Electronic data processing --- Electronic systems --- Information theory --- Telecommunication systems --- Data processing --- Electronic data interchange - Security measures --- Trust - Economic aspects
Choose an application
"This book proposes blockchain-based currencies, open algorithms, and data cooperatives as the foundation of a new economy that is decentralized, resilient, and secure"--
Digital currency --- Blockchains (Databases) --- Economic history --- Digital currency. --- Block chains (Databases) --- Database security --- Distributed databases --- Digital cash --- Digital money --- Electronic currency --- Electronic money --- Virtual currency --- Virtual money --- Electronic funds transfers --- Money --- Economic history - 21st century --- COMPUTERS / Data Science / General --- COMPUTERS / Blockchain --- COMPUTERS / Artificial Intelligence / General
Listing 1 - 4 of 4 |
Sort by
|