In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital ...
اقرأ المزيدProvides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...
اقرأ المزيدThe cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
اقرأ المزيدThis edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes ...
اقرأ المزيدExamine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on ...
اقرأ المزيدThe rapid development of communication technology, is bringing many technological conveniences with it and simplifying our ...
اقرأ المزيدProvides an insight about various techniques used in multimedia security and identifies its progress in both technological ...
اقرأ المزيدThis book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...
اقرأ المزيدThe three volume set LNCS 4232, LNCS 4233, and LNCS 4234 constitutes the refereed proceedings of the 13th International Conference ...
اقرأ المزيدThis book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدOptical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...
اقرأ المزيدPeer-to-Peer (P2P) is a communication structure in which individuals interact directly, without going through a centralized ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدThe significance of product lifecycle management (PLM - Product Lifecycle Management, formerly referred to, in a narrower ...
اقرأ المزيدThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
اقرأ المزيدConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
اقرأ المزيدInformation security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
اقرأ المزيدThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
اقرأ المزيدWelcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
اقرأ المزيد