Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This volume examines core areas of development in security, emphasizing the pivotal contributions of women to the field’s evolution.... Læs mere
Bemærk: Kan ikke leveres før jul.
This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Everyone expects the products and services they use to be secure, but 'building security in' at the earliest stages of a system's design also means designing for use as well.
Bemærk: Kan ikke leveres før jul.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers.
Bemærk: Kan ikke leveres før jul.
This book contains practical steps business users can take to implement data management in a number of ways, including data governance, data architecture, master data management, business intelligence, and others.
Bemærk: Kan ikke leveres før jul.
This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book constitutes the thoroughly refereed post-conference proceedings of five international workshops held in the framework of the 8th Pacific-Rim Symposium on Image and Video Technology, PSIVT 2017, in Wuhan, China, in November 2017: Workshop on Human Behavior Analysis;