الكتب الالكترونية

عدد الكتب: 21 - 40 /97
978-0-387-25228-5
Computer Network Security

As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...

اقرأ المزيد
978-0-387-34189-7
CryptoGraphics

CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...

اقرأ المزيد
978-3-540-32418-8
Cryptography and Coding

Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...

اقرأ المزيد
978-3-540-77272-9
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

اقرأ المزيد
978-3-540-77272-9
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

اقرأ المزيد
9781292158587
Cryptography and Network Security: principles and practices / W. Stallings

Introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...

اقرأ المزيد
978-3-030-65411-5
Cryptology and Network Security

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...

اقرأ المزيد
978-3-540-76969-9
Cryptology and Network Security

This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...

اقرأ المزيد
978-3-540-76969-9
Cryptology and Network Security

This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...

اقرأ المزيد
978-3-540-49463-8
Cryptology and Network Security (vol. # 4301)

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...

اقرأ المزيد
978-3-540-89641-8
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...

اقرأ المزيد
978-3-658-35494-7
Data Security : Technical and Organizational Protection Measures against Data Loss and Computer Crime / Thomas H. Lenhard

Offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...

اقرأ المزيد
978-3-540-70567-3
Data and Applications Security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...

اقرأ المزيد
978-3-540-35999-9
Digital Rights Management

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...

اقرأ المزيد
978-3-540-92238-4
Digital Watermarking : 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in ...

اقرأ المزيد
978-0-387-68614-1
Economics of Identity Theft

This book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...

اقرأ المزيد
978-0-387-68614-1
Economics of Identity Theft

This book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...

اقرأ المزيد
978-3-540-74619-5
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

اقرأ المزيد
978-3-540-74619-5
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

اقرأ المزيد
978-3-540-31669-5
Fast Software Encryption (vol. # 3557)

The Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...

اقرأ المزيد
عدد الكتب: 21 - 40 /97