for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Written by an experienced consultant with 25 years industry experience in disaster recovery and business continuity, it contains tools and techniques to make business continuity, crisis management, and IT service continuity much easier.
Bemærk: Kan ikke leveres før jul.
Power analysis attacks allow the extraction of secret information from smart cards. In all these applications, the security of the smart cards... Læs mere
Bemærk: Kan ikke leveres før jul.
This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems;
Bemærk: Kan ikke leveres før jul.
Much debate has been given as to whether computer security is improved through the full disclosure of security vulnerabilities versus keeping the problems private and unspoken.
Bemærk: Kan ikke leveres før jul.
This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international... Læs mere
Bemærk: Kan ikke leveres før jul.
This text integrates different mobility data handling processes, from database management to multi-dimensional analysis and mining, into a unified presentation driven by the spectrum of requirements raised by real-world applications.
Bemærk: Kan ikke leveres før jul.
This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.
Bemærk: Kan ikke leveres før jul.
This 2-volume set constitutes the thoroughly refereed post-conference... Læs mere
Bemærk: Kan ikke leveres før jul.
Maximizing reader insights into the roles of intelligent agents in networks, air traffic and... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and... Læs mere
Bemærk: Kan ikke leveres før jul.
In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools.