000 04183cam a2200457 i 4500
001 1405843019
003 OCoLC
005 20250130162729.0
006 m o d
007 cr cnu---unuuu
008 231025t20232023nju o 000 0 eng d
019 _a1405405523
020 _a9781394167401
_qelectronic book
020 _a1394167407
_qelectronic book
020 _a1394167385
_qelectronic book
020 _a9781394167388
_q(electronic bk.)
020 _z9781394166336
_qhardcover
020 _z1394166338
_qhardcover
035 _a(OCoLC)1405843019
_z(OCoLC)1405405523
040 _aYDX
_beng
_erda
_cYDX
_dYDX
_dOCLKB
_dDG1
_dOCLCO
_dN$T
_dSFB
_dOCLCF
050 4 _aQA76.9.A25
_bQ83 2023
245 0 0 _aQuantum computing in cybersecurity /
_cedited by Romil Rawat... [and 6 others]
264 1 _aHoboken, NJ :
_bJohn Wiley & Sons, Inc. ;
_aBeverly, MA :
_bScrivener Publishing LLC,
_c2023
264 4 _c©2023
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
340 _gpolychrome
_2rdacc
_0http://rdaregistry.info/termList/RDAColourContent/1003
520 _aMachine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second. The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware
506 _aAvailable to OhioLINK libraries
650 0 _aComputer security.
_0https://id.loc.gov/authorities/subjects/sh90001862
_9912
700 1 _aRawat, Romil,
_d1986-
_0https://id.loc.gov/authorities/names/n2021070080
_eeditor
710 2 _aOhio Library and Information Network.
_0https://id.loc.gov/authorities/names/no95058981
776 0 8 _iPrint version:
_z1394166338
_z9781394166336
_w(OCoLC)1399164561
856 4 0 _3OhioLINK
_zConnect to resource
_uhttps://rave.ohiolink.edu/ebooks/ebc2/9781394167401
856 4 0 _3Wiley Online Library
_zConnect to resource
_uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401
856 4 0 _3Wiley Online Library
_zConnect to resource (off-campus)
_uhttps://go.ohiolink.edu/goto?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401
856 4 0 _3O'Reilly
_zConnect to resource
_uhttps://learning.oreilly.com/library/view/~/9781394166336/?ar
999 _c200463843
_d82055