Privacy Protocol

The IoT Architect's Guide to Attainable Security and Privacy  eBooks & eLearning

Posted by readerXXI at Jan. 30, 2022
The IoT Architect's Guide to Attainable Security and Privacy

The IoT Architect's Guide to Attainable Security and Privacy
by Damilare D. Fagbemi, David M. Wheeler
English | 2020 | ISBN: 081536816X | 330 Pages | True ePUB | 12.3 MB

Protocol Deep Dive: DNS  eBooks & eLearning

Posted by lucky_aut at June 19, 2023
Protocol Deep Dive: DNS

Protocol Deep Dive: DNS
Duration: 2h 21m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 608 MB
Genre: eLearning | Language: English

Billions of number sets are impossible to remember, that's why DNS is
critical to internal networks and the Internet. This course will teach you
how DNS works from configuration to security. Packets will be analyzed
with Wireshark at every step.
Multilayered Security and Privacy Protection in Car-to-X Networks: Solutions from Application down to Physical Layer (repost)

Multilayered Security and Privacy Protection in Car-to-X Networks: Solutions from Application down to Physical Layer by Hagen Stübing
English | 2013-06-03 | ISBN: 3658025301 | PDF | 256 pages | 5 MB
Security and Privacy in Digital Economy: First International Conference, SPDE 2020

Security and Privacy in Digital Economy: First International Conference, SPDE 2020, Quzhou, China, October 30 – November 1, 2020, Proceedings (Communications in Computer and Information Science, 1268) by Shui Yu, Peter Mueller, Jiangbo Qian
October 17, 2020 | ISBN: 9811591288 | English | 768 pages | PDF | 18 MB

Security and Privacy in Blockchains and the IoT  eBooks & eLearning

Posted by AvaxGenius at Aug. 2, 2023
Security and Privacy in Blockchains and the IoT

Security and Privacy in Blockchains and the IoT by Christoph Stach
English | PDF | 2023 | 168 Pages | ISBN : 3036562516 | 10 MB

Data have become an immensely valuable resource. They are the key driver that puts the smart into smart services. This is fundamentally fueled by two technological achievements, namely the Internet of Things (IoT), which enables the continuous and comprehensive collection of all kinds of data, and blockchain technologies, which provide secure data management and exchange. In addition to those information security measures, data privacy solutions are also required to protect the sensitive data involved. In this book, eight research papers address security and privacy challenges when dealing with blockchain technologies and the IoT.

Privacy and Philosophy: New Media and Affective Protocol  eBooks & eLearning

Posted by insetes at Dec. 25, 2022
Privacy and Philosophy: New Media and Affective Protocol

Privacy and Philosophy: New Media and Affective Protocol By Andrew McStay
2014 | 186 Pages | ISBN: 1433118998 | PDF | 4 MB

WHOIS Running the Internet: Protocol, Policy, and Privacy  eBooks & eLearning

Posted by readerXXI at Nov. 17, 2017
WHOIS Running the Internet: Protocol, Policy, and Privacy

WHOIS Running the Internet: Protocol, Policy, and Privacy
by Garth O. Bruen
English | 2016 | ISBN: 1118679555 | 352 Pages | ePUB | 12 MB

Whois Running the Internet: Protocol, Policy, and Privacy (repost)  eBooks & eLearning

Posted by arundhati at Oct. 7, 2019
Whois Running the Internet: Protocol, Policy, and Privacy (repost)

Garth O. Bruen, "Whois Running the Internet: Protocol, Policy, and Privacy"
English | 2015 | 355 pages | ISBN: 1118679555 | PDF | 10 MB

Privacy-Enhancing Fog Computing and Its Applications  eBooks & eLearning

Posted by nebulae at May 12, 2019
Privacy-Enhancing Fog Computing and Its Applications

Xiaodong Lin, "Privacy-Enhancing Fog Computing and Its Applications "
English | ISBN: 3030021122 | 2018 | 104 pages | EPUB, PDF | 7 MB + 2 MB

WiFi Hacking: Wireless Penetration and Security MasterClass  eBooks & eLearning

Posted by lucky_aut at Jan. 4, 2021
WiFi Hacking: Wireless Penetration and Security MasterClass

WiFi Hacking: Wireless Penetration and Security MasterClass
Duration: 3h 58m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 2.48 GB
Genre: eLearning | Language: English

Learn How to Hack All Types of Wireless Networks. Complete Series From Very Basic to Highly Advance Wireless Hacking.