for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 11th International... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 15th International... Læs mere
Bemærk: Kan ikke leveres før jul.
This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery.
Bemærk: Kan ikke leveres før jul.
This book guides readers through building an IT security plan. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now.
Bemærk: Kan ikke leveres før jul.
It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management.
Bemærk: Kan ikke leveres før jul.
This book constitutes the revised selected papers of the Second... Læs mere
Bemærk: Kan ikke leveres før jul.
The papers cover topics such as blockchain, asymmetric encryption,... Læs mere
Bemærk: Kan ikke leveres før jul.
The lastsection of this book introduces Big Data applications from differentcommunities, such as business, engineering and science.Big Data Concepts, Theories... Læs mere