Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This title eases the research burden, develops investigative protocols, and pulls together data into a... Læs mere
Bemærk: Kan ikke leveres før jul.
Internet Telephony is one of the most important and fastest growing technologies for emerging mobile networks, as it provides a viable technical and economical alternative to current... Læs mere
Bemærk: Kan ikke leveres før jul.
"The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of exception, suspicion and oppression that may lead to a complete disappearance of liberties.
Bemærk: Kan ikke leveres før jul.
Cyber Security and Quality of Service: Modelling and Analysis for Systems Dependability presents a wide range of modeling, analysis, and assurance techniques that address computer network dependability, security, and quality of service (QoS).
Bemærk: Kan ikke leveres før jul.
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve,... Læs mere
Bemærk: Kan ikke leveres før jul.
A dictionary and handbook that defines the field and provides unique insight Turn to Minoli-Cordovana's Authoritative Computer... Læs mere
Bemærk: Kan ikke leveres før jul.
Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications.
Bemærk: Kan ikke leveres før jul.
Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security.
Bemærk: Kan ikke leveres før jul.
Presents the primary hardware-based computer security approaches in an easy to read format. Provides... Læs mere
Bemærk: Kan ikke leveres før jul.
Presents an overview of Distributed Systems security concerns, challenges, processes and solutions. Discusses threats and vulnerabilities in... Læs mere