Search Constraints
Number of results to display per page
Results for:
Keywords
Computer security
Remove constraint Keywords: Computer security
1 - 4 of 4
Search Results
-
Others
Learning cyber security on TryHackMe is fun and addictive. Earn points by answering questions, taking on challenges and maintain your hacking streak through short lessons. Learn by following a structured paths and reinforce your skills in a real-world environment by completing guided, objective-based tasks and challenges.
- Subjects:
- Computing
- Keywords:
- Computer security
- Resource Type:
- Others
-
e-book
Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.
- Subjects:
- Computing
- Keywords:
- Drone aircraft Computer security Textbooks United States
- Resource Type:
- e-book
-
Courseware
6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.
- Subjects:
- Computing
- Keywords:
- Data protection Computer security Computer networks -- Security measures Data encryption (Computer science)
- Resource Type:
- Courseware
-
e-book
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.
- Subjects:
- Computing
- Keywords:
- Data encryption (Computer science) Computer security Computer networks -- Security measures Data protection
- Resource Type:
- e-book