Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book constitutes the thoroughly refereed proceedings of the 14th... Læs mere
Bemærk: Kan ikke leveres før jul.
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2014, held in Ibiza, Spain in September 2014 under the sponsorship of the UNESCO chair in Data Privacy.
Bemærk: Kan ikke leveres før jul.
This book constitutes the thoroughly refereed post-conference proceedings... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Multibiometric systems are expected to meet the stringent performance requirements imposed by large-scale authentication systems.Handbook of Multibiometrics, a professional... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Intended for a graduate-level course in Cryptographic Engineering, this text will teach students with a basic knowledge of computer cryptograms how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems.
Bemærk: Kan ikke leveres før jul.
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market... Læs mere
Bemærk: Kan ikke leveres før jul.
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P).