Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Providing a comprehensive reference on advanced topics in the field, this book addresses a variety of issues related to the... Læs mere
Bemærk: Kan ikke leveres før jul.
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the... Læs mere
Bemærk: Kan ikke leveres før jul.
Based on the research experience of the authors, this book provides a theoretical structure of fundamental number theory and algebra knowledge... Læs mere
Bemærk: Kan ikke leveres før jul.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in... Læs mere
Bemærk: Kan ikke leveres før jul.
Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. This second volume... Læs mere
Bemærk: Kan ikke leveres før jul.
Cryptography plays a crucial role in many aspects of today's world. This book comes with plenty of examples and exercises (many with hints and solutions), and... Læs mere
Bemærk: Kan ikke leveres før jul.
Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, steal their information,... Læs mere
Bemærk: Kan ikke leveres før jul.
What every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs.
Bemærk: Kan ikke leveres før jul.
Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, steal their information,... Læs mere
Bemærk: Kan ikke leveres før jul.
This text presents human factors in safety-critical systems. It includes discussion on causes of human error, human reliability assessment and human-computer interaction.
Bemærk: Kan ikke leveres før jul.
Takes readers through developing, distributing, and monitoring an information security awareness program. This book includes instructions on communicating the message and describes how to efficiently use outside sources to optimize the impact of a small staff.