This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
اقرأ المزيدThe 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...
اقرأ المزيدThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
اقرأ المزيدISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...
اقرأ المزيدJDBC Metadata, MySQL, and Oracle Recipes is the only book that focuses on metadata or annotation-based code recipes for JDBC ...
اقرأ المزيدThis exceptional book explains fundamentals in detail, supported by realistic examples, while most other books on the market ...
اقرأ المزيدOracle Applications DBA Field Guide provides scripts, notes, guidelines, and references to guide you safely through the crucial ...
اقرأ المزيدOracle Database 11g : New Features for DBAs and Developers is a comprehensive, example–laden review of the most significant ...
اقرأ المزيدApplication Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...
اقرأ المزيدReal Application Clusters (RAC) and the Grid architecture are Oracle's strategy for scaling out enterprise systems to cope ...
اقرأ المزيدPro Oracle Spatial for Oracle Database 11g shows how to take advantage of Oracle Databases built–in feature set for working ...
اقرأ المزيدThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
اقرأ المزيدThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدThis book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
اقرأ المزيدThis book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
اقرأ المزيدThe main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...
اقرأ المزيدConstitutes the thoroughly refereed post-proceedings of the First International Conference on Test and Proofs, TAP 2007, ...
اقرأ المزيدThis book covers the area of convergence of software proofing and testing and feature current research work that combines ...
اقرأ المزيدThe Definitive Guide to SOA: Oracle® Service Bus, Second Edition targets professional software developers and architects ...
اقرأ المزيد