The aim of the symposium was to provide an international forum for scientific - search in the technologies and applications ...
اقرأ المزيد
The aim of the symposium was to provide an international forum for scientific - search in the technologies and applications ...
اقرأ المزيد
Guide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks ...
اقرأ المزيد
“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...
اقرأ المزيد
The two volume set LNCS 4662 and LNCS 4663 constitutes the refereed proceedings of the 11th IFIP TC13 International Conference ...
اقرأ المزيد
The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. ...
اقرأ المزيد
Featuring full and short papers, posters and panels, Persuasive2008 highlighted new knowledge in the understanding and design ...
اقرأ المزيد
Real Application Clusters (RAC) and the Grid architecture are Oracle's strategy for scaling out enterprise systems to cope ...
اقرأ المزيد
Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...
اقرأ المزيد
This is the fundamental, definitive reference to Microsoft Small Business Server 2003. And it is relevant for all audiences: ...
اقرأ المزيد
Wikis are Web-based applications that allow all users not only to view pages but also to change them. The success of the ...
اقرأ المزيد