Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
As regulation and legislation evolve, the need for cost-effective audit and monitoring solutions will grow. This book offers an introduction of... Læs mere
Bemærk: Kan ikke leveres før jul.
The first to provide an in-depth coverage of the issues surrounding secure databases and applications, this book is methodically divided into eight sections, each of which focuses on specific key concepts of this increasingly important field.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. This book offers more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research.
Bemærk: Kan ikke leveres før jul.
Offers an approach to developing and implementing relevant security metrics essential for... Læs mere
Bemærk: Kan ikke leveres før jul.
Shows how to strategically maximize a limited security budget without compromising the quality of risk management initiatives. This book describes how to manage the... Læs mere
Bemærk: Kan ikke leveres før jul.
Reveals those aspects of hacking least understood by network administrators. This handbook analyzes subjects through a... Læs mere
Bemærk: Kan ikke leveres før jul.
Group theoretic problems appear to be the most promising source of hard computational problems for deploying cryptographic constructions. This title focuses on the specifics... Læs mere
Bemærk: Kan leveres før jul.
Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise
Bemærk: Kan ikke leveres før jul.
Offers information needed to track, monitor, investigate, document, and preserve both... Læs mere
Bemærk: Kan ikke leveres før jul.
Containing data on number theory, encryption schemes, and cyclic codes, this textbook presents coding theory, construction, encoding, and... Læs mere
Bemærk: Kan ikke leveres før jul.
This book discusses the current technologies of cryptography using DNA computing. It provides a judicious mix of concepts, solved examples and real life case studies.