for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. reviews... Læs mere
Bemærk: Kan ikke leveres før jul.
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers.
Bemærk: Kan ikke leveres før jul.
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely... Læs mere
Bemærk: Kan ikke leveres før jul.
This text integrates different mobility data handling processes, from database management to multi-dimensional analysis and mining, into a unified presentation driven by the spectrum of requirements raised by real-world applications.
Bemærk: Kan ikke leveres før jul.
Cyberterrorism
Bemærk: Kan ikke leveres før jul.
By promoting dissemination and sharing of knowledge, cyber-democracy allows a knowledge conversion of the local into the global (gloCal) and vice versa, resulting in a gloCal platform for communication and knowledge interaction and knowledge enhancement.
Bemærk: Kan ikke leveres før jul.
This book describes trends in email scams and offers tools and techniquesto identify such trends.
Bemærk: Kan ikke leveres før jul.
This book examines the practices of cybercriminals who steal and sell personal information acquired through... Læs mere
Bemærk: Kan ikke leveres før jul.
Presents information on the use of several algebraic techniques in analyzing the AES. This book is useful for academic and industry researchers in cryptology as well as for advanced-level students.
Bemærk: Kan ikke leveres før jul.
This book proposes a number of techniques to perform data mining tasks in a privacy-preserving way. The survey information included with each chapter is unique in terms of its focus on introducing the different topics more comprehensively.
Bemærk: Kan ikke leveres før jul.
This book is one of the first to cover SAT-solvers and how they can be used in cryptanalysis. It includes chapters on finite field linear algebra and the equicomplexity of matrix operations.
Bemærk: Kan ikke leveres før jul.
Decisions on the limits of privacy intrusions – or privacy protection, for that matter – are ultimately political decisions. Research can de?ne the design space in which service providers and regulators may try to ?nd acceptable tradeo?s between security and privacy.