Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 10th International... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017.
Bemærk: Kan ikke leveres før jul.
This book is an introduction to both offensive and defensive techniques of cyberdeception. Special attention is devoted to cyberdeception in industrial control systems and within operating systems.
Bemærk: Kan ikke leveres før jul.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle.
Bemærk: Kan ikke leveres før jul.
This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are... Læs mere
Bemærk: Kan ikke leveres før jul.
Helps IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets. This book bridges the gap between information security, information systems security and information warfare.
Bemærk: Kan ikke leveres før jul.
The book is divided into two sections, "Geometries and Codes" and "Geometries and Cryptography". The first part covers such topicsas Galois geometries, Steiner systems, Circle geometry and applications to algebraic coding theory.
Bemærk: Kan ikke leveres før jul.
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery.
Bemærk: Kan ikke leveres før jul.
This book constitutes the proceedings of the 5th International Symposium on... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014.