Description

Book Synopsis

Chapter 1. The Origins of Cybersecurity.- Chapter 2. The Devil is in the Details.- Chapter 3. The Science of Authentication.- Chapter 4. The Failure of Indirect Interaction.- Chapter 5. Digital IDs: The Solution That Was Ignored.- Chapter 6. Direct User Interaction: The Game Changer.- Chapter 7. Digital Superposition: A New Layer in Network Security.- Chapter 8. Rethinking Security: Insights from Einstein and Hawking.- Chapter 9. Pre-Authentication vs. Post-Authentication in Network Security.- Chapter 10. The Illusion of MFA Compliance.- Chapter 11. Pre-Authentication vs. Post-Authentication in Network Security.- Chapter 12. Digital ID: Transforming Key Industries.- Chapter 13. The Mitigations That No Longer Matter.- Chapter 14. The Battle for Integrity in Security.- Chapter 15. Big Data Vs. Network Security.- Chapter 16. The Future of Network Security.- Chapter 17. Implementing the Change.- Chapter 18. Digital ID as the New Endpoint.- Chapter 19. The Inescapable Conflict: Public vs. Private in Cybersecurity.- Chapter 20. The Unified Quantum Security Model: 
A New Approach to Cybersecurity.- Chapter 21. The Urgency of Action.

Quantum Security

Product form

£17.99

Includes FREE delivery

RRP £19.99 – you save £2.00 (10%)

Order before 4pm tomorrow for delivery by Thu 8 Jan 2026.

A Paperback by Christopher Murphy

10 in stock


    View other formats and editions of Quantum Security by Christopher Murphy

    Publisher: Apress
    Publication Date: 3/7/2025
    ISBN13: 9798868812392, 979-8868812392
    ISBN10: 9798868812392

    Description

    Book Synopsis

    Chapter 1. The Origins of Cybersecurity.- Chapter 2. The Devil is in the Details.- Chapter 3. The Science of Authentication.- Chapter 4. The Failure of Indirect Interaction.- Chapter 5. Digital IDs: The Solution That Was Ignored.- Chapter 6. Direct User Interaction: The Game Changer.- Chapter 7. Digital Superposition: A New Layer in Network Security.- Chapter 8. Rethinking Security: Insights from Einstein and Hawking.- Chapter 9. Pre-Authentication vs. Post-Authentication in Network Security.- Chapter 10. The Illusion of MFA Compliance.- Chapter 11. Pre-Authentication vs. Post-Authentication in Network Security.- Chapter 12. Digital ID: Transforming Key Industries.- Chapter 13. The Mitigations That No Longer Matter.- Chapter 14. The Battle for Integrity in Security.- Chapter 15. Big Data Vs. Network Security.- Chapter 16. The Future of Network Security.- Chapter 17. Implementing the Change.- Chapter 18. Digital ID as the New Endpoint.- Chapter 19. The Inescapable Conflict: Public vs. Private in Cybersecurity.- Chapter 20. The Unified Quantum Security Model: 
    A New Approach to Cybersecurity.- Chapter 21. The Urgency of Action.

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account