Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more.
Bemærk: Kan ikke leveres før jul.
Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems.
Bemærk: Kan ikke leveres før jul.
This book first offers a baseline in identity, including coverage of identity concepts, the laws of identity, and the identity metasystem. It then details Windows CardSpace: what it is, where it could be used, where it should be used, and how to implement it.
Bemærk: Kan ikke leveres før jul.
Presents information on the use of several algebraic techniques in analyzing the AES. This book is useful for academic and industry researchers in cryptology as well as for advanced-level students.
Bemærk: Kan ikke leveres før jul.
This book proposes a number of techniques to perform data mining tasks in a privacy-preserving way. The survey information included with each chapter is unique in terms of its focus on introducing the different topics more comprehensively.
Bemærk: Kan ikke leveres før jul.
This book is one of the first to cover SAT-solvers and how they can be used in cryptanalysis. It includes chapters on finite field linear algebra and the equicomplexity of matrix operations.
Bemærk: Kan ikke leveres før jul.
Decisions on the limits of privacy intrusions – or privacy protection, for that matter – are ultimately political decisions. Research can de?ne the design space in which service providers and regulators may try to ?nd acceptable tradeo?s between security and privacy.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
In its revised fifth edition, this book covers ethical, social and policy challenges arising from the convergence of computing and telecommunication and the spread of mobile information devices. Asks important questions about the impact of new technologies.
Bemærk: Kan ikke leveres før jul.
Offers an approach to handle and recover from a catastrophic data loss. This book helps both technical and... Læs mere
Bemærk: Kan ikke leveres før jul.
User level: Beginning-Intermediate
Bemærk: Kan ikke leveres før jul.
Intermediate-Advanced user level