45,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

This book is a highly technical, mathematically as well as technologically speaking, work aiming at solving some of main contemporary cyber security challenges. Executables, assembly code, or ,similarly, dalvik, obfuscated bytecode are now everywhere in devices, information systems, smartphones. Intellectual property (processing or communications) and access control systems largely consist of software systems made of such wild, hard to control, hacker measuring (yet useful!) data. Think about your privacy in a bottom-up way, for database access might need executables to be made secure, too.…mehr

Produktbeschreibung
This book is a highly technical, mathematically as well as technologically speaking, work aiming at solving some of main contemporary cyber security challenges. Executables, assembly code, or ,similarly, dalvik, obfuscated bytecode are now everywhere in devices, information systems, smartphones. Intellectual property (processing or communications) and access control systems largely consist of software systems made of such wild, hard to control, hacker measuring (yet useful!) data. Think about your privacy in a bottom-up way, for database access might need executables to be made secure, too. High cost multicore microprocessor will be needed, yet this shall be revelations to security.
Autorenporträt
The author is an engineer having R&D experience in famous German and Japanese multinationals in the field of electronics production. Moreover, he has been involved within italian academician cooperations in the field of cyber security. At the time of this work, the author is oriented towards his own consultant activity.