This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيدThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
اقرأ المزيدThis book summarizes important developments in telecommunications, including SS7 over IP, with a focus on SS7 network reliability.
اقرأ المزيدThe book covering the areas of algorithms, applications, and systems, thus bridging the gap between theory and practice and ...
اقرأ المزيدThe book covering the areas of algorithms, applications, and systems, thus bridging the gap between theory and practice and ...
اقرأ المزيدThis book constitutes the best papers of the Third International Conference on E-business and Telecommunication Networks, ...
اقرأ المزيدThis book contains fields of e-business and telecommunication networks, including aspects related to security, wireless systems, ...
اقرأ المزيدThis book contains fields of e-business and telecommunication networks, including aspects related to security, wireless systems, ...
اقرأ المزيدThis book contains the proceedings of the First European Conference on Computer Network Defence which took place in December ...
اقرأ المزيدThis book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...
اقرأ المزيدThe author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols ...
اقرأ المزيدFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
اقرأ المزيدIn this book Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, ...
اقرأ المزيدGuide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks ...
اقرأ المزيدThis book cover topics such as: e-health technology design; well-being technology; biomedical and health informatics; and ...
اقرأ المزيدThis book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...
اقرأ المزيدWelcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, ...
اقرأ المزيدThis volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place ...
اقرأ المزيد