Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Rather than outlining cyberspace as a new technology applied in military operations, here, Tsirigotis rallies against this... Læs mere
Bemærk: Kan ikke leveres før jul.
Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book presents medical image watermarking techniques and algorithms for telemedicine and other emerging applications. The authors have... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Helps IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets. This book bridges the gap between information security, information systems security and information warfare.
Bemærk: Kan ikke leveres før jul.
This book constitutes the proceedings of the 5th International Symposium on... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the thoroughly refereed post-proceedings of the 8th... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014.
Bemærk: Kan ikke leveres før jul.
This book constitutes the thoroughly refereed proceedings of the 14th... Læs mere