Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.
Bemærk: Kan ikke leveres før jul.
The analysis of violence at state and local levels reveals a fractal pattern of overlapping ecosystems of conflict risk that must be understood for effective, conflict-sensitive approaches to development and direct conflict mitigation efforts.
Bemærk: Kan ikke leveres før jul.
This book addresses the fundamental concepts in the theory and practice of visual cryptography. reviews a range of... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. side-channel analysis (case studies); fault analysis; and side-channel analysis (tools).
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 10th International... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 7th International... Læs mere
Bemærk: Kan ikke leveres før jul.
The reuse of EMR data can greatly benefit medical science and practice, but must be performed in a privacy-preserving way according to data sharing policies and regulations.
Bemærk: Kan ikke leveres før jul.
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec.
Bemærk: Kan ikke leveres før jul.
This book is an introduction to both offensive and defensive techniques of cyberdeception. Special attention is devoted to cyberdeception in industrial control systems and within operating systems.