Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component.
Bemærk: Kan ikke leveres før jul.
?The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The book is a collection of high-quality peer-reviewed research papers presented at the Fourth International Conference on Innovations in Computer Science and Engineering (ICICSE 2016) held at Guru Nanak Institutions, Hyderabad, India during 22 – 23 July 2016.
Bemærk: Kan ikke leveres før jul.
Chapters provide innovative thinking on themes including cyber security, maritime security, transnational crime, human security, globalization and economic security.
Bemærk: Kan ikke leveres før jul.
This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability.
Bemærk: Kan ikke leveres før jul.