Condizione: New.
Da: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condizione: New. Brand New. Soft Cover International Edition. Different ISBN and Cover Image. Priced lower than the standard editions which is usually intended to make them more affordable for students abroad. The core content of the book is generally the same as the standard edition. The country selling restrictions may be printed on the book but is no problem for the self-use. This Item maybe shipped from US or any other country as we have multiple locations worldwide.
EUR 23,51
Quantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: New. ISBN:9788176225250.
Da: Goodbooks Company, Springdale, AR, U.S.A.
Condizione: good. Has a sturdy binding with some shelf wear. May have some markings or highlighting. Used copies may not include access codes or Cd's. Slight bending may be present.
Condizione: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
EUR 124,11
Quantità: 1 disponibili
Aggiungi al carrelloBrand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 127,79
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 151,93
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. 1st edition NO-PA16APR2015-KAP.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 146,28
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 147,15
Quantità: 1 disponibili
Aggiungi al carrelloHardback. Condizione: New. New copy - Usually dispatched within 4 working days. 453.
Da: Majestic Books, Hounslow, Regno Unito
EUR 156,86
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
EUR 174,45
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 169,86
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 210,49
Quantità: 1 disponibili
Aggiungi al carrelloHRD. Condizione: New. New Book. Shipped from UK. Established seller since 2000.
EUR 213,12
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Editore: John Wiley & Sons Inc, New York, 2023
ISBN 10: 1394166338 ISBN 13: 9781394166336
Lingua: Inglese
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Hardcover. Condizione: new. Hardcover. Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second. The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware. This new volume delves into the latest cutting-edge trends and the most up-to-date processes and applications for quantum computing to bolster cybersecurity. Whether for the veteran computer engineer working in the field, other computer scientists and professionals, or for the student, this is a one-stop-shop for quantum computing in cyber security and a must have for any library. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
HRD. Condizione: New. New Book. Shipped from UK. Established seller since 2000.
EUR 210,48
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 227,42
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 221,88
Quantità: 2 disponibili
Aggiungi al carrelloHardcover. Condizione: Brand New. 328 pages. 9.19x6.13x9.21 inches. In Stock.
EUR 234,68
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
Prima edizione
EUR 252,09
Quantità: 10 disponibili
Aggiungi al carrelloCondizione: New. 2023. 1st Edition. hardcover. . . . . .
EUR 212,38
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New. Über den AutorRomil Rawat, PhD, is an assistant professor at Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore. With over 12 years of teaching experience, he has published numerous papers in scholarly journals and conferen.
Editore: John Wiley & Sons Inc, New York, 2023
ISBN 10: 1394166338 ISBN 13: 9781394166336
Lingua: Inglese
Da: CitiRetail, Stevenage, Regno Unito
EUR 230,50
Quantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: new. Hardcover. Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second. The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware. This new volume delves into the latest cutting-edge trends and the most up-to-date processes and applications for quantum computing to bolster cybersecurity. Whether for the veteran computer engineer working in the field, other computer scientists and professionals, or for the student, this is a one-stop-shop for quantum computing in cyber security and a must have for any library. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Da: Majestic Books, Hounslow, Regno Unito
EUR 275,15
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New.
EUR 288,67
Quantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: Brand New. 544 pages. 9.50x6.50x1.25 inches. In Stock.
Condizione: New. 2023. 1st Edition. hardcover. . . . . . Books ship from the US and Ireland.
Editore: John Wiley & Sons Inc, New York, 2023
ISBN 10: 1394166338 ISBN 13: 9781394166336
Lingua: Inglese
Da: AussieBookSeller, Truganina, VIC, Australia
EUR 337,64
Quantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: new. Hardcover. Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second. The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware. This new volume delves into the latest cutting-edge trends and the most up-to-date processes and applications for quantum computing to bolster cybersecurity. Whether for the veteran computer engineer working in the field, other computer scientists and professionals, or for the student, this is a one-stop-shop for quantum computing in cyber security and a must have for any library. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.