Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the... Læs mere
Bemærk: Kan ikke leveres før jul.
An increasing reliance on the Internet and mobile communication has deprived us of our usual means of assessing another party's... Læs mere
Bemærk: Kan ikke leveres før jul.
This title eases the research burden, develops investigative protocols, and pulls together data into a... Læs mere
Bemærk: Kan ikke leveres før jul.
This advanced book is a comprehensive guide to security issues in wireless ad hoc and sensor networks. The book is organized into two main sections. The... Læs mere
Bemærk: Kan ikke leveres før jul.
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve,... Læs mere
Bemærk: Kan ikke leveres før jul.
"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan leveres før jul.
This class-tested textbook will provide in-depth coverage of the fundamentals of machine learning, with an exploration of... Læs mere
Bemærk: Kan ikke leveres før jul.
Describes the essential software security concepts that are needed to conduct relevant and effective tests. This book considers foundation concepts, processes and techniques in... Læs mere
Bemærk: Kan ikke leveres før jul.
The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? This book answers those questions.
Bemærk: Kan ikke leveres før jul.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies.