Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Intended for a graduate-level course in Cryptographic Engineering, this text will teach students with a basic knowledge of computer cryptograms how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems.
Bemærk: Kan ikke leveres før jul.
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market... Læs mere
Bemærk: Kan ikke leveres før jul.
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P).
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The 7th Annual Working Conference of ISMSSS (lnformation Security... Læs mere
Bemærk: Kan ikke leveres før jul.
Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management.
Bemærk: Kan ikke leveres før jul.
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road.
Bemærk: Kan ikke leveres før jul.
"Fundamentals of Speaker Recognition" introduces Speaker Identification, Speaker Verification, Speaker (Audio Event) Classification, Speaker Detection, Speaker Tracking and more.
Bemærk: Kan ikke leveres før jul.
This fully updated new edition of the classic work on information theory presents a detailed analysis of Shannon-source and channel-coding theorems, before moving on to address sources, channels, codes and the properties of information and distortion measures.