🍂 Autumn reading time! Let our AI Librarian find your perfect cozy read 🫖
Explore the literary world of this author
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML langu...
This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastr...
Bio-inspired thin-wall structures with excellent mechanical properties, high-energy absorption capabilities, and a desirable lightweight level have be...
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in sec...
Application to Malicious Code Fingerprinting
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough under...
An Automated Approach to Improving Network Security
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack pa...
This book addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, t...