Search Constraints
Number of results to display per page
Results for:
1 - 6 of 6
Search Results
-
Video
As quantum computing matures, it's going to bring unimaginable increases in computational power along with it -- and the systems we use to protect our data (and our democratic processes) will become even more vulnerable. But there's still time to plan against the impending data apocalypse, says encryption expert Vikram Sharma. Learn more about how he's fighting quantum with quantum: designing security devices and programs that use the power of quantum physics to defend against the most sophisticated attacks.
- Subjects:
- Electronic and Information Engineering, Physics, and Computing
- Keywords:
- Quantum computing Data encryption (Computer science)
- Resource Type:
- Video
-
Others
Learning cyber security on TryHackMe is fun and addictive. Earn points by answering questions, taking on challenges and maintain your hacking streak through short lessons. Learn by following a structured paths and reinforce your skills in a real-world environment by completing guided, objective-based tasks and challenges.
- Subjects:
- Computing
- Keywords:
- Computer security
- Resource Type:
- Others
-
e-book
Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.
- Subjects:
- Computing
- Keywords:
- Drone aircraft Computer security Textbooks United States
- Resource Type:
- e-book
-
Video
This video introduces basic terminology in cryptography, including what is a ciphertext, plaintext, keys, public key crypto, and private key crypto. This is a video shared via the picoCTF youtube channel. picoCTF is a platform organized by Carnegie Mellon University (“CMU”)
- Subjects:
- Computing
- Keywords:
- Cryptography Data encryption (Computer science)
- Resource Type:
- Video
-
Courseware
6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.
- Subjects:
- Computing
- Keywords:
- Data protection Computer security Computer networks -- Security measures Data encryption (Computer science)
- Resource Type:
- Courseware
-
e-book
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.
- Subjects:
- Computing
- Keywords:
- Data protection Computer security Computer networks -- Security measures Data encryption (Computer science)
- Resource Type:
- e-book