Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems.
Bemærk: Kan ikke leveres før jul.
This book provides an introduction to applied cryptanalysis, that is, cryptanalysis that actually breaks ciphers and/or systems. The emphasis is on detailed case studies of specific ciphers and attacks.
Bemærk: Kan ikke leveres før jul.
This book includes additional features to the first edition which offered a practical introductory approach to the techniques of error concealment. Comprehensive... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan leveres før jul.
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information.
Bemærk: Kan leveres før jul.
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you.
Bemærk: Kan ikke leveres før jul.
Enhance the digital security knowledge--base within any organization In todaya s competitive business environment, information and... Læs mere
Bemærk: Kan ikke leveres før jul.
Describes the essential software security concepts that are needed to conduct relevant and effective tests. This book considers foundation concepts, processes and techniques in... Læs mere
Bemærk: Kan leveres før jul.
Introduces the problems of computer security to researchers with a machine learning background. This book introduces machine learning concepts to... Læs mere
Bemærk: Kan ikke leveres før jul.
As regulation and legislation evolve, the need for cost-effective audit and monitoring solutions will grow. This book offers an introduction of... Læs mere
Bemærk: Kan ikke leveres før jul.
The first to provide an in-depth coverage of the issues surrounding secure databases and applications, this book is methodically divided into eight sections, each of which focuses on specific key concepts of this increasingly important field.
Bemærk: Kan ikke leveres før jul.