for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book presents, in a single volume, a full description of all the constraints (including legal contexts around performance, reliability norms, etc. ) and examples of... Læs mere
Bemærk: Kan ikke leveres før jul.
This book explores the practicalities of secure voice communication management. The author discusses various communication mediums, highlighting their... Læs mere
Bemærk: Kan ikke leveres før jul.
Cyber Security and Quality of Service: Modelling and Analysis for Systems Dependability presents a wide range of modeling, analysis, and assurance techniques that address computer network dependability, security, and quality of service (QoS).
Bemærk: Kan ikke leveres før jul.
A review of the principles of the safety of software-based equipment, this book begins by presenting the definition principles of safety objectives.
Bemærk: Kan ikke leveres før jul.
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve,... Læs mere
Bemærk: Kan ikke leveres før jul.
Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc. ) has increased rapidly.... Læs mere
Bemærk: Kan ikke leveres før jul.
A dictionary and handbook that defines the field and provides unique insight Turn to Minoli-Cordovana's Authoritative Computer... Læs mere
Bemærk: Kan ikke leveres før jul.
This one-of-a-kind collection consists of actual cases written by fraud examiners out in the field. These cases were hand selected from hundreds of... Læs mere
Bemærk: Kan ikke leveres før jul.
Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications.
Bemærk: Kan ikke leveres før jul.
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities.
Bemærk: Kan ikke leveres før jul.
This book provides an understanding of governance and its relevance to information security. It gives readers a clear,... Læs mere
Bemærk: Kan ikke leveres før jul.
Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security.